EP1816805A1 - Ad-hoc network and method employing globally optimized routes for packets - Google Patents

Ad-hoc network and method employing globally optimized routes for packets Download PDF

Info

Publication number
EP1816805A1
EP1816805A1 EP07002140A EP07002140A EP1816805A1 EP 1816805 A1 EP1816805 A1 EP 1816805A1 EP 07002140 A EP07002140 A EP 07002140A EP 07002140 A EP07002140 A EP 07002140A EP 1816805 A1 EP1816805 A1 EP 1816805A1
Authority
EP
European Patent Office
Prior art keywords
hoc network
network devices
neighbor
node
routing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07002140A
Other languages
German (de)
French (fr)
Inventor
Sujit Ranjan Das
Luis Rafael Pereira
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eaton Corp
Original Assignee
Eaton Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eaton Corp filed Critical Eaton Corp
Publication of EP1816805A1 publication Critical patent/EP1816805A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/30Connectivity information management, e.g. connectivity discovery or connectivity update for proactive routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/42Centralised routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update

Definitions

  • This invention relates generally to communication networks and, more particularly, to routing algorithms for ad-hoc networks, such as, for example, a multi-hop or a low rate - wireless personal area network (LR-WPAN).
  • the invention also relates to methods of routing communications in a communication network, such as an ad-hoc network.
  • WSNs wireless sensor networks
  • the sensor networks strive to meet a minimum quality of service specific to the application domain with varying tolerable degrees of message delivery latency and reliability.
  • Many message routing schemes have been proposed for these sensor networks that meet specific quality of service requirements. See, e.g., Lundberg, D., "Ad hoc protocol evaluation and experiences of real world ad hoc networking," Tech. Rep., Department of Information Technology, Uppsala University, 2002, which provides an overview of these routing proposals. Contrary to the perception, many of these routing schemes are difficult to implement in a low-end 8-bit microprocessor with limited memory and processing power. Maintaining the relatively low cost of these sensing devices is the fundamental premise for rapid field adoption. Often, adequate range of sensing coverage cannot be achieved due to a limitation in the number of message hops permitted under a routing scheme. Disproportionately large routing control message overhead also causes poor message latency and throughput in the sensing network.
  • Sensor networks differ from Internet-like broadband networks in many fronts. These networks can handle much lower data rates, typically up to about 250 Kbps. They can tolerate very little routing overhead and need to guarantee better message delivery latency and reliability. In some cases, the nodes in the network are either fully mobile or semi-mobile in the sense that only a small subset of nodes may move around infrequently. Finally, the implementation of the routing protocol should require minimal computing resources. As a result of these differences, it is believed that existing Internet routing strategies cannot be directly applied to sensor networks.
  • Dijkstra's algorithm solves the single-source shortest path problem for a directed graph with nonnegative edge weights. For example, if the vertices of the graph represent cities and edge weights represent driving distances between pairs of cities connected by a direct road, Dijkstra's algorithm can be used to find the shortest route between two cities.
  • the input of the algorithm consists of a weighted directed graph G and a source vertex s in graph G.
  • Set V is the set of all vertices in the graph G.
  • Each edge of the graph is an ordered pair of vertices (u,v) representing a connection from vertex u to vertex v.
  • the set of all edges is denoted as set E.
  • Weights of edges are given by a weight function w: E -> [0, ⁇ ]; therefore, w(u,v) is the non-negative cost of moving from vertex u to vertex v.
  • the cost of an edge can be thought of as, or a generalization of, the distance between those two vertices.
  • the cost of a path between two vertices is the sum of costs of the edges in that path. For a given pair of vertices s and t in V, the algorithm finds the path from s to t with lowest cost ( i.e., the shortest path). It can also be used for finding costs of shortest paths from a single vertex s to all other vertices in the graph.
  • Proactive Source Routing is a relatively very simple routing protocol designed specifically for mesh networking that can be implemented in a low-cost sensor node. See U.S. Patent Application Publication No. 2004/0233855 .
  • PSR is designed to provide a very simple and efficient routing mechanism that can be implemented in an 8-bit embedded processor.
  • N network coordinator
  • the NC is the Pan Coordinator of the network.
  • a message from a non-NC node, called a network device (ND) is typically directed to the NC. The NC, in turn, forwards the message to the destination ND.
  • a new node when a new node is powered up, it broadcasts a beacon request.
  • This member node has previously gone through a similar discovery cycle to join the network. As a result, it has learned its routing information to send and receive messages from the NC.
  • Upon receiving the beacon request it may choose to respond by sending its identity or address to the beaconing node.
  • the new node collects beacon responses from one or more such willing member nodes. It stores the address along with a cost indicator for each of these neighbor member in its local routing table.
  • the cost indicator represents the current link quality of the communication link between the new node and the corresponding neighbor member node. Note that this cost (i.e., the local link cost) is an indicator local to the communication between the pair of nodes only.
  • ND A if a new member ND A wants to send a message to another member ND B, in PSR, this is accomplished by ND A sending an upstream message to the NC. Upon receiving the message, the NC forwards it to the requested destination ND B as a downstream message as shown in Figure 1B.
  • ND A To initiate sending the upstream message, ND A looks in its local routing table to select the neighbor with the minimum current local link cost. ND A first attempts to send the message to this minimum local link cost neighbor, say ND C. Upon receipt of this message, ND C (a relay node) follows a similar neighbor selection using its own routing table to forward the message to another ND. Before it does that, ND C adds its own address to the message as part of the routing specification. This process continues until the message reaches the NC. Along the way, each relay node adds its own address to the message routing specification.
  • ND C a relay node
  • the NC upon receiving the message, extracts and saves the routing specification which is the route that the message from ND A followed to the NC.
  • the NC stores the sequence of intermediate relay node addresses as the route for ND A. Anytime, the NC needs to send a downstream message to an ND, such as ND A, it will copy this previously learned route in reverse order of addresses as the downstream routing specification as shown in Figure 1B.
  • each relay node will remove its own address from the routing specification. It also determines the next node that the message is to be relayed to from this specification.
  • Each node sends the message to a known neighbor based on a current local cost indicator. If the message fails to be delivered to the neighbor after a fair number of retrials, then the node selects the next minimum link cost local neighbor.
  • PSR is suboptimal in the sense that it follows the route that is deemed to be optimum locally. With this local approach, a message sometimes will take a globally suboptimal route, possibly taking a greater count of "hops" than is necessary. This has the potential to add extra delays and to decrease the probability of final message delivery. PSR also requires the routing specification to be incrementally added in upstream routing which limits the number of hops that a message can take to arrive at the NC. More significantly, it is required to send this routing specification which is purely routing overhead.
  • the present invention employs a graph framework for routing packets in an ad-hoc network, such as a wireless sensor network (WSN).
  • WSN wireless sensor network
  • the framework builds upon a robust and efficient proactive source routing (PSR) algorithm and, also, harnesses dynamic graph algorithms to globally optimize route selection based on available link costs of individual pairs of wireless nodes.
  • PSR proactive source routing
  • an ad-hoc network comprises: an ad-hoc network coordinator comprising: a first processor, a first memory, and a first communication interface; and a plurality of ad-hoc network devices, each of the ad-hoc network devices comprising: a second processor, a second memory, and a second communication interface structured to communicate with the first communication interface of the ad-hoc network coordinator or with the second communication interface of at least another one of the ad-hoc network devices, wherein the first processor cooperates with at least some of the ad-hoc network devices to globally optimize a route based on a plurality of link costs for: (i) pairs of the ad-hoc network devices, or (ii) pairs of the ad-hoc network devices and at least one pair including one of the ad-hoc network devices and the ad-hoc network coordinator, in order to minimize cost along the route that: (a) one of the ad-hoc network devices or the ad-hoc network coordinator employs
  • the ad-hoc network devices may be structured to build and maintain a plurality of local graphs to manage packet routing locally for the corresponding one of the ad-hoc network devices; and the ad-hoc network coordinator may be structured to build and maintain a global graph to manage packet routing globally for the ad-hoc network.
  • the local graphs may comprise a set of vertices corresponding to some of the ad-hoc network devices, a set of edges connecting the vertices, and a set of link costs associated with the edges.
  • a method is for determining routing of packets of an ad-hoc network comprising an ad-hoc network coordinator and a plurality of ad-hoc network devices in which the ad-hoc network devices communicate with the ad-hoc network coordinator or with at least another one of the ad-hoc network devices.
  • the method comprises: employing a plurality of link costs for: (i) pairs of the ad-hoc network devices, or (ii) pairs of the ad-hoc network devices and at least one pair including one of the ad-hoc network devices and the ad-hoc network coordinator; globally optimizing a route based on the link costs; and minimizing cost along the route that: (a) one of the ad-hoc network devices or the ad-hoc network coordinator employs to send a packet to: (b) another one of the ad-hoc network devices or the ad-hoc network coordinator.
  • wireless shall expressly include, but not be limited by, radio frequency (RF), light, visible light, infrared, IrDA, ultrasound, wireless area networks, IEEE 802.11 (e.g., 802.11 a; 802.11 b; 802.11 g), IEEE 802.15 (e.g., 802.15.1; 802.15.3, 802.15.4), other wireless communication standards (e.g., without limitation, ZigBee TM Alliance standard), DECT, PWT, pager, PCS, Wi-Fi, Bluetooth TM , and cellular.
  • RF radio frequency
  • IEEE 802.11 e.g., 802.11 a; 802.11 b; 802.11 g
  • IEEE 802.15 e.g., 802.15.1; 802.15.3, 802.15.4
  • other wireless communication standards e.g., without limitation, ZigBee TM Alliance standard
  • the term "portable communicating device” shall expressly include, but not be limited to, any portable communicating device having a wireless communication port (e.g. , a handheld device; a handheld personal computer (PC); a portable or laptop PC; a Personal Digital Assistant (PDA); a mobile or cellular telephone; a wireless Internet device; a protocol-enabled telephone; a portable wireless device).
  • a wireless communication port e.g. , a handheld device; a handheld personal computer (PC); a portable or laptop PC; a Personal Digital Assistant (PDA); a mobile or cellular telephone; a wireless Internet device; a protocol-enabled telephone; a portable wireless device).
  • NC network coordinator
  • ND network device
  • any communicating device e.g., a portable communicating device; a fixed communicating device, such as, for example, switches, motion sensors or temperature sensors as employed in a wirelessly enabled sensor network
  • ND network device
  • node includes NDs and NCs.
  • centralized routing is a routing system in which a central system is responsible for telling other nodes which routes to use.
  • a "graph” is a diagram or other representation consisting of a finite set of nodes and internode connections (i.e., edges), which can be used for representing network connections.
  • localized routing is a routing system in which each node decides on the basis of locally available information, which routes to use.
  • loop free is a routing algorithm property, which provides that a message routed in a network will either be delivered to its final destination or be discarded in a finite amount of time.
  • connected network device is a network device whose participation in an ad-hoc communication network was accepted by the network coordinator.
  • network topology is a definition of the logical arrangement and interconnection pattern of nodes in a communication network.
  • routing is the function of finding a suitable path for a message to take from one node to its final destination.
  • mains-powered refers to any ND, which has continuous power capabilities (e.g., powered from an AC outlet or AC receptacle or AC power source; AC/DC powered devices; rechargeable battery powered devices; other rechargeable devices), but excluding non-rechargeable battery powered devices.
  • the present invention is described in association with a wireless sensor network, although the invention is applicable to a wide range of ad-hoc networks.
  • the present WSN routing methodology (PSRg or "graph-based PSR", but not to be confused with "PSR") is based on graph theory.
  • PSR is disclosed by U.S. Patent Application Publication No. 2004/0233855 , which is incorporated by reference herein.
  • the wireless nodes may be semi-mobile and may employ, for example, an IEEE 802.15.4 compliant radio or transceiver.
  • each node manages the routing information in the form of a graph.
  • the routing graph is updated to the network coordinator (NC) node in the network.
  • NC network coordinator
  • This NC merges all the local graphs to form and manage a global routing graph.
  • this NC node computes and specifies globally optimized routes to be followed by the network device (ND) nodes.
  • the NC follows globally optimized routes to communicate with the ND nodes.
  • the ND nodes do not need to use or accumulate routing specification in the message they transmit to the NC. This removes any maximum hop limitation for these messages and gains performance improvements over PSR.
  • the disclosed routing methodology combines the simplicity of PSR with the power of graph representation and analysis. This provides the following improvements: (1) given a set of nodes in the network and the associated link cost, cost is minimized along the route that node i selects to send a packet to another node j; (2) routing overhead is reduced; (3) the full potential of connectivity that exists in a network for routing robustness is exploited; and (4) the NC routing data is stored and processed more efficiently. These are accomplished by employing an efficient representation and analysis of the wireless link connectivity and routing information of nodes in a given mesh network. Graph data structures are employed by PSRg, while each ND node builds and maintains a graph to manage the routing locally, the NC node does the same to manage the routing globally. Each local graph is a smaller subset of the global graph.
  • the WSN routing information in the NC is represented as a graph G(V,E,C).
  • the graph contains a set of vertices, V; a set of edges, E, connecting these vertices; and a set of link costs, C. All of the routing graphs are a function of time since vertices and edges are added and removed in real-time, reflecting the dynamics of the underlying WSN. For simplicity of disclosure, time is not mentioned in the notations of the graphs employed.
  • Each vertex v ⁇ V represents a node in the network.
  • the assigned vertex numbers are unique for each node in the network and correspond to its address.
  • the vertex v is also referred to as a member node in the network. In the WSN architecture, only one of these nodes is the NC.
  • the vertex number for the NC is 0. Every other vertex v represents one of the NDs.
  • Each edge e ⁇ E is defined as an ordered pair of vertices.
  • e ij (i, j) where ij ⁇ V and i ! j.
  • node i has a wireless link with node j and can send a message to it.
  • Node j is called a neighbor of node i. This link is a directed one from node i to node j.
  • C ⁇ + is a set of link costs associated with the edges.
  • a mapping c : E ⁇ C computes the link cost c(e ij ) associated with edge e ij . So, each edge e ⁇ E is assigned a link cost c(e) ⁇ C, where C is a multiset and, hence, can have duplicate elements since two edges can have the same link cost.
  • Link cost is a quality measure of the reliability of the wireless communication link between two nodes. See, e.g., Hershberger, J., et al., "Vickrey prices and shortest paths: What is an edge worth?,” Foundations of Computer Science, 2001, Proceedings. 42nd IEEE Symposium on, October 2001, pp. 252-59 . This is a dynamic measure that depends on several factors such as, for example, wireless radio energy in the environment, and level of radio activity in the receiving node. Metal or concrete barriers can also significantly reduce the link quality. Computation of a suitable link cost is known. See, e.g., Draves, R., et al., “Comparison of routing metrics for static multi-hop wireless networks," Tech. Rep. MSR-TR-2004-18, Microsoft Research, 1999 (describing and comparing cost estimation techniques that indicate the wireless link quality in ad hoc networks).
  • the link cost is generally asymmetrical in nature.
  • the link cost and, hence, the reliability of communication link when sending a message from a node i to another node j is not always the same as sending a message from node j to node i.
  • the chances that the message will arrive at the NC is lower than if the NC is to send a message to the ND. This is because the NC will handle more message traffic and, hence, be more prone to dropping or loosing packets. This is generally true between two neighboring nodes since there will be asymmetry of network traffic.
  • the NC does not compute the link costs.
  • Each ND computes its link costs based on various relevant parameters available and sends those to the NC. Since, the NC does not have direct access to these parameters, it cannot compute the link costs.
  • the radio links between two nodes are not always perfectly symmetrical. However, arbitrarily considering all links (hence all graph edges) to be unidirectional is equivalent to ignoring existing redundant connectivity in a given network. This may result in suboptimal routing performance. On the other hand, by assuming unidirectionality of the edges, one can be less concerned about potential loops in the routing scheme.
  • Figures 2A-2E show the routing graphs for a specific mesh network at a snapshot of time to.
  • Each of the nodes 0,1,2,3, as shown with nodes 0 and 1, includes a processor 90, a memory 91 and a suitable communication interface 92.
  • An edge connecting an upstream neighbor is drawn in solid line in the local graphs, while a downstream neighbor is connected as a dotted line edge.
  • node 0 is the NC and nodes 1, 2 and 3 are the NDs.
  • Figure 2A shows an example NC routing graph G.
  • the link costs are shown adjacent to each edge. For example, the link cost c(e 21 ) associated with the edge from node 2 to node 1 is shown as cost c 21 .
  • hop is sometimes used to describe an intermediate node that a message is relayed through.
  • the number of hops in a route r is, therefore,
  • . If r sd ⁇ d ⁇ , then the message can be transmitted directly to the destination node d without using any intermediate node.
  • route r is employed and the source and destination nodes for which they are specified are eliminated.
  • a route r is valid if it is continuous and loop-free.
  • route cost of a valid route r is the sum of all the local link costs along the route.
  • route cost is shown by Equation 3.
  • r ⁇ sd r sd ⁇ n - 1 , r sd ⁇ n - 2 , ... , r sd 1 , s
  • the NC builds and maintains a graph G to manage the routing in the network.
  • Each node in the network manages local routing information by maintaining a graph as well.
  • a local graph for node i ⁇ V is represented as G i (V i , E i , C i ) where V i _ V and E i _ E.
  • the NC knows its own local graph G 0 in addition to the global graph G.
  • each ND Similar to the NC global routing graph, each ND also maintains the local link costs in a multiset C i . Unlike the NC, however, the ND i can compute link costs corresponding to its local routing graph edges. This is possible, since all the relevant parameters for computing this cost are only available to the local node. Consequently, a local link cost computing function is fLC i : V i - i ⁇ ⁇ ⁇ R + . Node i can compute the link cost to another node in its local routing graph by applying this function. Since, in this graph framework, there are no "self edges", the node does not need to compute the link cost to itself. This function may be suitably tuned for an individual ND.
  • the link cost function for a battery operated ND will be different from that of a "mains-powered" ND.
  • the local cost map c i is E i ⁇ C i .
  • Figures 2B, 2C, 2D and 2E represent the local routing graphs for nodes 0, 1, 2 and 3, respectively.
  • the property ... i, ⁇ j ⁇ V i ( e ji ⁇ E i ) states that a local graph G i for any node i shall have only outgoing edges from i .
  • the set of nodes V us i _ V i is called the upstream nodes with respect to the node i if ... j ⁇ 0 ⁇ ⁇ ⁇ R u ⁇ s i satisfy the following conditions: (1) j ⁇ (V i 4 ⁇ 0 ⁇ ) - ⁇ i ⁇ ; (2)
  • the first condition provides that an upstream neighbor is a node in the local graph for i. Node 0 in this local graph is always an upstream node for i. Node i cannot be its own upstream neighbor.
  • the second condition states that there exists a valid route from node j to the NC without going through node i. Finally, the last condition forbids node i from being an upstream neighbor in the local graph for j .
  • V u ⁇ s 0 ⁇ states that the NC cannot have any upstream neighbor(s). This is true since the NC (node 0) is the first node to establish the network. In other words, no other member node can join this network before the NC does.
  • V d ⁇ s i V i - V u ⁇ s i - i .
  • V i i ⁇ 4 ⁇ V u ⁇ s i ⁇ 4 ⁇ V d ⁇ s i states that every node other than the node itself in a local graph is either an upstream or a downstream node. This follows directly from the definitions of upstream and downstream neighbors.
  • local graph G 2 has node 1 as an upstream neighbor of node 2.
  • node 2 is a downstream neighbor of node 1.
  • the NC is always a member of the network (since it starts the network formation). Any other node can only be a member of the network if it has at least one upstream neighbor.
  • Membership reflects connectivity of the node in the network. In a mesh network, each new node should find a way to send messages to the NC. Upstream connectivity of a node gives it the ability to reach the NC eventually, either directly (with one hop) or indirectly (with multiple hops).
  • the difference between a member node and an isolated node is that in the latter case, the node is known to the network, but it does not have any upstream neighbor to communicate to the NC. If a node has only downstream neighbors, then it cannot be said that there is a valid route from that node to the NC.
  • a locally minimum cost neighbor is the neighbor out of all the known neighbors of a node that has the minimum link cost.
  • Of interest is either the upstream LMCN or downstream LMCN for a given node since the node will often need to send such directional messages.
  • V ⁇ V and fLMCN ds V ⁇ V give the LMCN for a given node i for upstream and downstream directions as shown by Equations 5 and 6, respectively:
  • the terms lmcn i us and lmcn i ds denote the output of fLMCN us (i) and fLMCN ds (i), respectively.
  • the global graph in the NC is equal to the union of all the local graphs at the ND (which is strong synchronization) except that the costs for some edges in the global graph are not equal to the costs for the counterpart edges in the local graph.
  • the NC has the complete knowledge of the connectivity information of every member ND without perfect knowledge of link costs.
  • the network routing performance should improve by maintaining weak synchronization a majority of the time and choosing to attain strong synchronization only intermittently or infrequently.
  • a network is not synchronized if it is neither strongly nor weakly synchronized. Any routing scheme should completely avoid or at least minimize the chances of the network attaining this form of synchronization. If this happens, message loss will increase in the system. Increasing routing delay is another potential observable consequence.
  • Equations 11-16 cover optimizing the routing in a given wireless sensor network.
  • GMCR globally minimum cost route
  • This GMCR is simply the route choice among all the possible routes available for the pair that has the minimum overall route cost. Note that the GMCR uses the minimum cost over the entire route, not just over one link.
  • GMCR is r i ⁇ j gmc , the return value of fGMCR(i,j). Due to the link cost asymmetry property, in general, r i ⁇ j gmc ⁇ r j ⁇ i gmc ,
  • GMCN global minimum cost neighbor
  • fGMCR(i,j) ⁇ There are three properties for any non-empty GMCR (i.e., fGMCR(i,j) ⁇ ).
  • fGMCR i ⁇ j fGMCR i ⁇ k ⁇ 4 ⁇ fGMCR i ⁇ k ... i , j ⁇ ⁇ ⁇ V , k ⁇ ⁇ ⁇ r ij gmc .
  • a GMCR consists of many sub-GMCRs. Any sub-route of a GMCR is also a GMCR.
  • the other two properties are important in defining an efficient upstream routing procedure.
  • the second property, fGMCN(fGMCN(fGMCN(i, j), j), j) ... j ... i, j ⁇ V, i ⁇ j states that a destination node can be traced by successively finding global minimum cost neighbors. This can be derived using the first property.
  • the third property, fGMCR(i, j) ⁇ fGMCN(i, j), fGMCN(fGMCN(i, j), j), ... , j ⁇ ...i,j ⁇ V, i ⁇ j, states that the complete global minimum cost route can be traced using successive global minimum cost neighbors terminating at the destination node j . This can be derived using the first two properties.
  • Equation 13 is called single source minimum cost route function fSSMCR.
  • fSSMCR computes the GMCR from each node i to j ⁇ i.
  • fSSMCR i r ij gmc : ⁇ j ⁇ V , j ⁇ i fSSMCR(i) then returns a set of routes represented as SSMCR i .
  • a function_ fSSMCN(i) collects the GMCNs corresponding to each GMCR computed by fSSMCR(i).
  • the function of Equation 14 returns a set SSMCN i containing all the single source minimum cost neighbors for source node i.
  • fSSMCN i gmcn i ⁇ j : ⁇ j ⁇ V , j ⁇ i
  • a function fSDMCN (i) of Equation 16 collects the GMCNs corresponding to each GMCR computed by fSDMCR(i). The function returns a set SDMCN i containing all the single destination minimum cost neighbors for destination node i.
  • fSDMCN i gmcn j ⁇ i : ⁇ j ⁇ V , j ⁇ i
  • the disclosed PSRg architecture has four main functions: (1) route discovery; (2) upstream routing; (3) downstream routing; and (4) route recovery.
  • Route recovery is the process of recovering from any error condition that may happen during the routing of a packet. This can happen during either downstream or upstream routing. For example, if an intermediate node is non-operational, then the packet cannot be routed further after being sent to this node. Hence, the error is detected and a remedial action is taken by the sending node.
  • Figures 2A-2E a network state at time t 0 is depicted in Figures 2A-2E.
  • the network has already formed with the NC (node 0) and three other member NDs (nodes 1, 2 and 3).
  • Figure 2A shows the current state of the global routing graph
  • G and Figures 2B through 2E show the local routing graphs G 0 through G 3 for nodes 0 through 3, respectively.
  • a new node is powered up inside the radio range of the nodes of the existing network.
  • the new node goes through route discovery steps with participation from other member nodes.
  • An example set of message interchanges and the sequence of these messages are shown in Figure 3.
  • the member nodes are marked with their respective short address, equivalently the corresponding vertex number in the local and global graph representations.
  • the new node is marked as x, since it only obtains its short address during the route discovery phase from the NC as was described above. Address allocation is obtained during the very first time a new node performs route discovery. If the new node is reset and restarted again to join the same network as before, then it retains the short address previously allocated.
  • wireless messages e.g., Beacon Request; Beacon Response; Beacon Confirm; Neighbor Update; Route Update
  • Figure 3 wireless messages
  • the symbol " ⁇ " is employed before a message name which represents that the node running the procedure is the sender of the message.
  • the symbol " ⁇ " is employed to represent that the node is the receiver of the message.
  • all broadcast messages are represented as (node is the sender) or as f (node is the receiver).
  • a superscript with these arrows is the address of the immediate neighbor to which the message is being sent to ( ⁇ j ) or the message is being received from ( ⁇ j ).
  • Figure 4A shows the procedure RouteDiscoveryClient 100.
  • a node (ND) executes the RouteDiscoveryClient procedure 100 when it is powered up or reset or when the node is isolated from the network.
  • This procedure 100 first calls procedure NeighborDiscovery 102 of Figure 4B to learn about its member neighbors. It then uses procedure UpdateRoute 104 of Figure 4D to update the NC of the network about its newly learned neighbors and, in turn, receives recommendations about which neighbor to use for sending upstream messages that will yield maximum routing efficiency or minimum routing cost.
  • FIG 4B shows the procedure NeighborDiscovery 102.
  • the node i erases its existing local routing graph since, in this procedure, it will rebuild this graph from scratch.
  • the node broadcasts a Beacon_Request message 110.
  • This message 110 is equivalent to a "hello" message from this node for other neighboring member nodes.
  • this message 110 is marked as 1.
  • the nodes 1, 2 and 3 receive this message 110 since these nodes are the only ones, in this example, within the radio range of the new node x.
  • This broadcast message 110 is shown as three different messages from node x to each of nodes 1, 2 and 3 all originating at the same time t 1 .
  • Nodes 1, 2 and 3 have already gone through the discovery process to become a member of the network hosted by the NC, node 0.
  • Each such member node also executes the procedure NeighborDiscoveryCoordinate 112 of Figure 4C.
  • step 114 only the member nodes execute this process.
  • steps 116 and 118 whenever the node receives a Beacon_Request message 110, it sends out a Beacon_Response message 122.
  • This response message has to be broadcast, since the request message does not carry any information about the sender node identity.
  • this response message carries the link cost c ij 120 as computed by the node i to the node j from which it just received the request message.
  • node x receives a set of such Beacon_Response broadcasts (message 2) 122 from its member neighbors at times t 2 , t 3 , and t 4 .
  • the new node x waits for a fixed duration for the Beacon_Response message 122 from a member node j.
  • the new node x receives the link cost c ji 127 sent by node j and computes its own link cost c ij 137 to node j, using its link cost function fLC i .
  • the new node x Upon receipt of each such message 122, the new node x adds (in step 128) the member node j as another upstream vertex in its local graph G i . Also, in step 130, the new node x adds an edge from i (itself) to j . With this, this node i now knows that its member node j is an upstream neighbor and can be used to send a wireless message upstream (closer to the NC). In step 132, the new node x adds the newly computed link cost to C'. Lastly, in step 134, the new node x sends a Beacon_Confirm message 136 to node j indicating that it accepted and recorded node j as its downstream neighbor.
  • the member neighbor is waiting to receive any Beacon_Confirm message 136 in step 138 of the NeighborDiscoveryCoordinate procedure 112 of Figure 4C.
  • the member neighbor When it receives this message from the new node x (in step 140), it adds the node as its downstream neighbor (in step 142). It then adds an edge from itself to the new node (step 144) and the previously computed corresponding link cost (step 146) in its local graph.
  • the graphs 148,150,152 in Figure 5C, 5D and 5E have added the new node x (node 4) as a downstream neighbor and the corresponding edges.
  • Node 4 has built its local graph G 4 in Figure 5F with three upstream neighbor nodes (1, 2 and 3) with the corresponding edges as well.
  • Figure 4D shows procedure UpdateRoute 104.
  • the new node 4 executes the UpdateRoute procedure 104 of Figure 4D to update the NC with its new found neighbor connectivity data.
  • the NC never executes this procedure 104 since it does not go through the neighbor discovery process.
  • the local neighbor which receives the Neighbor_Update message 160 is not the NC (which is the case in Figure 3)
  • that node uses its upstream routing procedure (as is discussed below in connection with Figures 4F and 4G) to send the packet to the NC. This may take more than one hop as shown in Figure 3 where the message 160 is first sent to node 2 at t 8 , then to node 1 at t 9 and finally to the NC at t 10 .
  • Figure 4E shows the RouteDiscoveryService procedure 166.
  • the message is processed in Figure 4E when the NC receives it. Only the NC in the network provides this service.
  • a node establishes itself in the role of the NC in the network, it initializes this procedure 166 in even steps 168 through 174 and then waits in an infinite loop starting at 176 for Neighbor_Update messages, such as 161.
  • step 170 of initialization it starts with an empty global routing graph G and then adds only one vertex 0 to the graph. This vertex represents the NC itself since it has already become a de facto member.
  • the NC initializes a set of current GMCRs with it being the source. This SSMCR set is employed for sending messages downstream.
  • step 174 the NC maintains two sets of SDMCN for destination as 0 (i. e. , the NC itself as destination, relevant for upstream routing).
  • SDMCN maintains the set of current GMCNs and SSMCN to maintain a set of previous GMCNs.
  • the NC When it receives a Neighbor_Update message 161 originated at a client node i, the NC first removes all the existing edges to and from node i in graph G. This is accomplished in step 178 using the graph minus operator of Equation 8. If the client node i is attempting to join the network for the first time, then there will be no existing edges and, hence, no connectivity information for the node in G. In step 180, using the graph union operation of Equation 7, the newly arrived edges or connectivity information is added to graph G. Hence, essentially, in these two steps, the past connectivity information is replaced with the new one received from the client node.
  • step 182 the existing SDMCN node information is saved for use later in step 190 of the procedure 166.
  • SDMCN is recomputed as per Equation 16 with the NC as the destination.
  • step 186 the downstream GMCR information is updated using Equation 13.
  • the NC determines the nodes for which gmcn for upstream routing to destination 0 has changed from the previous updates. The NC then sends a Route_Update message 164 ( Figure 3) to each such node with the respective new gmcn (in step 192).
  • the route discovery client node is waiting for a Route_Update message 165 in step 162 of the UpdateRoute procedure 104 ( Figure 4D).
  • the node updates its gmcn address.
  • the node employs this address as the preferred neighbor for all upstream messages meant for the NC.
  • the NC ascertains that this gmcn is indeed one of its known neighbors with which it has established a radio link.
  • the node 4 is ready for regular upstream and downstream function that will be discussed next.
  • a message follows upstream routing if the NC is the final destination.
  • PSRg adopts a very simple and efficient upstream routing mechanism.
  • a node always forwards the message to its gmcn.
  • the next node receives the message and recognizes that it is an upstream message, it, in turn, forwards the same to its gmcn.
  • the message can arrive at the destination 0.
  • the third property asserts that this route is indeed the globally minimum cost route and, hence, the most efficient route available.
  • the upstream message can be delivered to the NC irrespective of the number of hops it has to go through. Each additional hop adds extra latency to the message delivery.
  • Figure 4F shows procedure XmitUpstream 204.
  • This procedure 204 outlines the algorithmic step that any node follows to transmit a message upstream.
  • the NC never uses this procedure 204 since it is the final destination of all such messages.
  • the same procedure 204 is used for sending upstream messages from a source node as well as relaying of upstream messages from intermediate nodes.
  • the only step 206 in the procedure 204 sends the upstream message Msg us with the given payload pl to its gmcn.
  • Each upstream message carries the source node s that originated this message.
  • the NC needs to know this address so that it can send a confirmation message to source node s upon receipt of Msg us .
  • Each upstream message carries a unique message identifier mid which is used by the source nodes to associate a confirmation from the NC to a specific message.
  • Figure 4G shows procedure ProcessUpstreamMsg 208.
  • a node i uses this procedure 208 when it receives an upstream message sent by another node using the procedure 204 of Figure 4F.
  • the NC has to process upstream messages differently since it is the final destination or the sink of all such messages.
  • the NC uses step 210 of this procedure, first to send a confirmation to the source node s. This confirmation message is a downstream message and is sent using the procedure 200 of Figure 4H, as will be discussed. Then, in step 212, it suitably processes the upstream message. This ends the life of this upstream message.
  • an intermediate node uses step 214 of the procedure 208 to simply forward the message to its gmcn using the procedure 204 of Figure 4F.
  • the final destination (the NC) is always known to the nodes. Accordingly, the NC can provide them with the corresponding gmcn to which they will forward the message.
  • the final destination will not be a fixed node. It can be any node other than the NC.
  • the NC it is possible for the NC to update a node with the set of gmcn for each possible destination ( i.e. , all other nodes). With this information, the node will look at the destination of the message and will find the corresponding gmcn, very much like the upstream routing.
  • the downstream message will not carry along any routing specification. Hence, there will be no limit on how many hops the message routes through.
  • a node will process the message if it is the final destination.
  • this approach requires a lot of routing update overhead and is not preferred for a large scale network.
  • a slightly modified approach can also be considered to alleviate this routing update overhead problem.
  • the NC instead of the NC updating the gmcn value for all other nodes in the network, it can update the nodes with the gmcn values for a particular downstream destination on demand.
  • the NC establishes a route to a downstream destination when it needs to send a message for the first time. Once the route is established, each intermediate node remembers the corresponding gmcn for the destination for future use. Consequently, the downstream routing is similar to the upstream routing, yet with less routing overhead.
  • the above approach can further be improved by observing the implications of the three properties.
  • the shortest path tree (SPT) is computed for graph G for source 0.
  • Each branch of this tree is a GMCR.
  • the downstream route r e corresponding to each such branch can be uniquely specified by the end node e ⁇ V in the branch.
  • the route r e is established on-demand.
  • the NC does not need to send updates for a set of gmcn to each node i ⁇ r e for all other nodes in r e which are downstream to i. It needs to send an update for only one gmcn to each i ⁇ r e .
  • a downstream message needs to carry end node e and the final destination of the message.
  • a node receives this message, and if it is not the intended destination, then it will forward the message to the gmcn that it has received previously associating the route r e .
  • the route update overheads are kept to a minimum.
  • downstream message routing is simple as that for an upstream message. Such an approach does not carry any routing specification and does not impose any ceiling on the number of message hops.
  • the node at which it sub-branches receives and manages multiple gmcn for each downstream subbranch.
  • there is no further routing update overhead and the complete route specification is carried with each downstream message. Since the source of all such messages is the NC, it can attach an accurate and optimized routing specification to the message. At this time, the network is no less than weakly synchronized.
  • Figure 4H shows the procedure XmitDownstream 200. Like its upstream transmit counterpart of Figure 4F, the procedure 200 of Figure 4H is used to initiate a message, albeit a downstream message. However, unlike the procedure 204 of Figure 4F, only the NC uses the procedure 200 of Figure 4H since it initiates all downstream messages. There are two major differences between these two procedures 204,200. First, in the only step 216 of the procedure 200 of Figure 4H, the entire routing specification r 0 ⁇ d gmc is attached as part of the Msg ds and this route is the GMCR for the given source and destination.
  • Routing specification r 0 ⁇ d gmc is readily available from step 184 of the procedure 166 of Figure 4E which computes and saves all such GMCRs to each possible destination.
  • Msg ds does not have to carry the source address 0 as every destination node knows this a priori. The destination node needs to know this address since it sends a confirmation back to the source node upon receiving the message.
  • FIG. 4I shows the procedure ProcessDownstreamMsg 218.
  • This procedure 218 is invoked when a downstream message Msg ds is received at the current node i from a node j . Only a node i ⁇ 0 can receive this message.
  • the current node did not receive this message incorrectly or accidentally violating routing specification carried in the message. If the current node is the intended final destination, then, in step 222, it sends a receipt confirmation to the NC using the upstream procedure 204 of Figure 4F.
  • the message is suitably processed to end its life.
  • step 226 If the current node is just an intermediate hopping node, in step 226, it removes its address from the route specification and then ascertains that the new route specification is not empty. In step 228, it simply forwards the message to the first node in the revised route specification.
  • SSMCR 0 is computed by applying Dijkstra's single source shortest path algorithm on G from source 0. The algorithm computes first the shortest path tree (SPT). SSMCR 0 can then be easily computed from the SPT.
  • the implementation preferably employs a conventional minimum priority queue data structure. The algorithm complexity for this approach to computation is O(E log(V)).
  • SDMCN 0 is computed from Equation 16. To compute this, first compute SDMCR 0 from Equation 15. The Dijkstra algorithm computes the SPT for a single source to all other destination. In order to apply, the Dijkstra algorithm computes the SPT for a single destination, after first taking the transpose of graph G to compute G T . The transpose operation just changes the direction of all the edges in the original graph G. Then, the Dijkstra algorithm is applied on G T to compute a new SPT taking node O as the source (not destination) node. SDMCR 0 can then be easily computed from this SPT. G T can be computed in O(E) time. Hence, the overall time to compute SDMCR 0 , and thus SDMCN 0 is still O(E log(V)).
  • Every node is assigned a globally unique fixed address which is 8 bytes in length. It is expensive to use this long address with each message. Instead, the network preferably issues and manages a short address to each member node that is locally unique. In other words, the address is unique only within the given network. The short address is typically limited to 2 bytes in length.
  • the implementation preferably serially allocates the vertex numbers for each new node. This same number is used as the short address for the node. Hence, the short address allocation and maintenance is simplified by following the graph based approach. If a node leaves the network permanently, then its short address will be available to be assigned to the next new node.
  • the disclosed PSRg approach optimizes the storage of routing data at the NC, while simultaneously extracting more implicit information about routing and network topology from it.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

An ad-hoc network includes an ad-hoc network coordinator (NC) having a first processor, a first memory, and a first communication interface; and a plurality of ad-hoc network devices (NDs). Each of the NDs includes a second processor, a second memory, and a second communication interface structured to communicate with the first communication interface of the NC or with the second communication interface of at least another one of the NDs. The first processor cooperates with at least some of the NDs to globally optimize a route based on a plurality of link costs for: (i) pairs of the NDs, or (ii) pairs of the NDs and at least one pair including one of the NDs and the NC, in order to minimize cost along the route that: (a) one of the NDs or the NC employs to send a packet to: (b) another one of the NDs or the NC.

Description

    BACKGROUND OF THE INVENTION Field of the Invention
  • This invention relates generally to communication networks and, more particularly, to routing algorithms for ad-hoc networks, such as, for example, a multi-hop or a low rate - wireless personal area network (LR-WPAN). The invention also relates to methods of routing communications in a communication network, such as an ad-hoc network.
  • Background Information
  • The ubiquitous nature of wireless sensor networks (WSNs) in industrial, commercial and residential applications has brought new research challenges in this domain. Among these challenges is an efficient routing scheme suited for low rate WSNs.
  • The advent of WSNs promises to spread the usage of inexpensive sensing technology in a wide variety of application domains. For example, industrial, commercial and residential areas are quick to adopt that technology. These application domains demand that underlying ad hoc networking technology is self-configurable, scalable and robust. Typically, these applications do not require a relatively large data bandwidth.
  • The market interest and potential of WSN technology can be judged from many active consortia and standards groups to promote its commercial use. These include, for example, IEEE 802.15.4, Zigbee Alliance and WINA. Most recently, there is formation of a 6LoWPAN working group under the auspices of IETF.
  • The sensor networks strive to meet a minimum quality of service specific to the application domain with varying tolerable degrees of message delivery latency and reliability. Many message routing schemes have been proposed for these sensor networks that meet specific quality of service requirements. See, e.g., Lundberg, D., "Ad hoc protocol evaluation and experiences of real world ad hoc networking," Tech. Rep., Department of Information Technology, Uppsala University, 2002, which provides an overview of these routing proposals. Contrary to the perception, many of these routing schemes are difficult to implement in a low-end 8-bit microprocessor with limited memory and processing power. Maintaining the relatively low cost of these sensing devices is the fundamental premise for rapid field adoption. Often, adequate range of sensing coverage cannot be achieved due to a limitation in the number of message hops permitted under a routing scheme. Disproportionately large routing control message overhead also causes poor message latency and throughput in the sensing network.
  • The lack of an adequate formal analytical framework to specify, verify and guarantee network performance for WSN is proving to be a bottleneck for larger user acceptance. There has been a relatively large body of research work on routing algorithms in other areas, such as, for example, Internet routing protocols. Some of these techniques are based on formal theoretical foundations. See, e.g., Daescu, O., et al., "Gara: A geometry aided routing algorithm," 2004 Workshop on High Performance Switching and Routing, 2004, pp. 224-28 (geometric computing); West, D., Introduction To Graph Theory, Prentice Hall, second edition, 2001 (graph theory); and Kurose, J., et al., Computer Networking: A top-Down Approach Featuring the Internet, Addison Wesley, second edition, 2003 (use of Bellman Ford and Dijkstra's algorithms for Internet routing protocols).
  • Sensor networks, however, differ from Internet-like broadband networks in many fronts. These networks can handle much lower data rates, typically up to about 250 Kbps. They can tolerate very little routing overhead and need to guarantee better message delivery latency and reliability. In some cases, the nodes in the network are either fully mobile or semi-mobile in the sense that only a small subset of nodes may move around infrequently. Finally, the implementation of the routing protocol should require minimal computing resources. As a result of these differences, it is believed that existing Internet routing strategies cannot be directly applied to sensor networks.
  • Dijkstra's algorithm solves the single-source shortest path problem for a directed graph with nonnegative edge weights. For example, if the vertices of the graph represent cities and edge weights represent driving distances between pairs of cities connected by a direct road, Dijkstra's algorithm can be used to find the shortest route between two cities. The input of the algorithm consists of a weighted directed graph G and a source vertex s in graph G. Set V is the set of all vertices in the graph G. Each edge of the graph is an ordered pair of vertices (u,v) representing a connection from vertex u to vertex v. The set of all edges is denoted as set E. Weights of edges are given by a weight function w: E -> [0, ∞]; therefore, w(u,v) is the non-negative cost of moving from vertex u to vertex v. The cost of an edge can be thought of as, or a generalization of, the distance between those two vertices. The cost of a path between two vertices is the sum of costs of the edges in that path. For a given pair of vertices s and t in V, the algorithm finds the path from s to t with lowest cost (i.e., the shortest path). It can also be used for finding costs of shortest paths from a single vertex s to all other vertices in the graph.
  • Proactive Source Routing (PSR) is a relatively very simple routing protocol designed specifically for mesh networking that can be implemented in a low-cost sensor node. See U.S. Patent Application Publication No. 2004/0233855 . PSR is designed to provide a very simple and efficient routing mechanism that can be implemented in an 8-bit embedded processor. In a PSR architecture, one node in the sensor network is designated and acts as a network coordinator (NC). In IEEE 802.15.4 parlance, the NC is the Pan Coordinator of the network. A message from a non-NC node, called a network device (ND), is typically directed to the NC. The NC, in turn, forwards the message to the destination ND.
  • In the PSR architecture, when a new node is powered up, it broadcasts a beacon request. A node that has already joined the network and is located within the radio range of the beaconing device, receives the beacon request. This member node has previously gone through a similar discovery cycle to join the network. As a result, it has learned its routing information to send and receive messages from the NC. Upon receiving the beacon request, it may choose to respond by sending its identity or address to the beaconing node. The new node collects beacon responses from one or more such willing member nodes. It stores the address along with a cost indicator for each of these neighbor member in its local routing table. The cost indicator represents the current link quality of the communication link between the new node and the corresponding neighbor member node. Note that this cost (i.e., the local link cost) is an indicator local to the communication between the pair of nodes only.
  • As shown in Figure 1A, if a new member ND A wants to send a message to another member ND B, in PSR, this is accomplished by ND A sending an upstream message to the NC. Upon receiving the message, the NC forwards it to the requested destination ND B as a downstream message as shown in Figure 1B.
  • To initiate sending the upstream message, ND A looks in its local routing table to select the neighbor with the minimum current local link cost. ND A first attempts to send the message to this minimum local link cost neighbor, say ND C. Upon receipt of this message, ND C (a relay node) follows a similar neighbor selection using its own routing table to forward the message to another ND. Before it does that, ND C adds its own address to the message as part of the routing specification. This process continues until the message reaches the NC. Along the way, each relay node adds its own address to the message routing specification.
  • The NC, upon receiving the message, extracts and saves the routing specification which is the route that the message from ND A followed to the NC. In other words, the NC stores the sequence of intermediate relay node addresses as the route for ND A. Anytime, the NC needs to send a downstream message to an ND, such as ND A, it will copy this previously learned route in reverse order of addresses as the downstream routing specification as shown in Figure 1B. As the message traverses downstream towards ND A, each relay node will remove its own address from the routing specification. It also determines the next node that the message is to be relayed to from this specification.
  • The above routing scheme is simple to implement and works well for relatively small networks. Each node sends the message to a known neighbor based on a current local cost indicator. If the message fails to be delivered to the neighbor after a fair number of retrials, then the node selects the next minimum link cost local neighbor.
  • However, PSR is suboptimal in the sense that it follows the route that is deemed to be optimum locally. With this local approach, a message sometimes will take a globally suboptimal route, possibly taking a greater count of "hops" than is necessary. This has the potential to add extra delays and to decrease the probability of final message delivery. PSR also requires the routing specification to be incrementally added in upstream routing which limits the number of hops that a message can take to arrive at the NC. More significantly, it is required to send this routing specification which is purely routing overhead.
  • Using the PSR approach, since the NC receives and saves the complete routing specifications from each ND, it needs a relatively large memory for storing that data. Even worse, there is a relatively large amount of redundant information in the routing specification coming from the different NDs. Although this redundancy can be removed by intelligent software filtering, there is, nevertheless, an increased address overhead that provides an opportunity for improvement.
  • Accordingly, there is room for improvement in ad-hoc networks and methods for routing packets in such networks.
  • SUMMARY OF THE INVENTION
  • These needs and others are met by the present invention, which employs a graph framework for routing packets in an ad-hoc network, such as a wireless sensor network (WSN). The framework builds upon a robust and efficient proactive source routing (PSR) algorithm and, also, harnesses dynamic graph algorithms to globally optimize route selection based on available link costs of individual pairs of wireless nodes.
  • In accordance with one aspect of the invention, an ad-hoc network comprises: an ad-hoc network coordinator comprising: a first processor, a first memory, and a first communication interface; and a plurality of ad-hoc network devices, each of the ad-hoc network devices comprising: a second processor, a second memory, and a second communication interface structured to communicate with the first communication interface of the ad-hoc network coordinator or with the second communication interface of at least another one of the ad-hoc network devices, wherein the first processor cooperates with at least some of the ad-hoc network devices to globally optimize a route based on a plurality of link costs for: (i) pairs of the ad-hoc network devices, or (ii) pairs of the ad-hoc network devices and at least one pair including one of the ad-hoc network devices and the ad-hoc network coordinator, in order to minimize cost along the route that: (a) one of the ad-hoc network devices or the ad-hoc network coordinator employs to send a packet to: (b) another one of the ad-hoc network devices or the ad-hoc network coordinator.
  • The ad-hoc network devices may be structured to build and maintain a plurality of local graphs to manage packet routing locally for the corresponding one of the ad-hoc network devices; and the ad-hoc network coordinator may be structured to build and maintain a global graph to manage packet routing globally for the ad-hoc network.
  • The local graphs may comprise a set of vertices corresponding to some of the ad-hoc network devices, a set of edges connecting the vertices, and a set of link costs associated with the edges.
  • As another aspect of the invention, a method is for determining routing of packets of an ad-hoc network comprising an ad-hoc network coordinator and a plurality of ad-hoc network devices in which the ad-hoc network devices communicate with the ad-hoc network coordinator or with at least another one of the ad-hoc network devices. The method comprises: employing a plurality of link costs for: (i) pairs of the ad-hoc network devices, or (ii) pairs of the ad-hoc network devices and at least one pair including one of the ad-hoc network devices and the ad-hoc network coordinator; globally optimizing a route based on the link costs; and minimizing cost along the route that: (a) one of the ad-hoc network devices or the ad-hoc network coordinator employs to send a packet to: (b) another one of the ad-hoc network devices or the ad-hoc network coordinator.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A full understanding of the invention can be gained from the following description of the preferred embodiments when read in conjunction with the accompanying drawings in which:
    • Figures 1A-1B are message diagrams of upstream and downstream routing for the PSR algorithm.
    • Figure 2A is a routing graph showing a state before route discovery initiated by a new node, in which a global graph is at the network coordinator (NC), node 0, in accordance with the present invention.
    • Figures 2B-2E are routing graphs showing local graphs of the nodes 0 through 3, respectively.
    • Figure 3 is a message sequence diagram showing messages exchanged during route discovery in accordance with the present invention.
    • Figure 4A is a diagram of a procedure Route DiscoveryClient.
    • Figure 4B is a diagram of a procedure NeighborDiscovery.
    • Figure 4C is a diagram of a procedure NeighborDiscoveryCoordinate.
    • Figure 4D is a diagram of a procedure UpdateRoute.
    • Figure 4E is a diagram of a procedure RouteDiscoveryService.
    • Figure 4F is a diagram of a procedure XmitUpstream.
    • Figure 4G is a diagram of a procedure ProcessUpstreamMsg.
    • Figure 4H is a diagram of a procedure XmitDownstream.
    • Figure 4I is a diagram of a procedure ProcessDownstreamMsg.
    • Figure 5A is a routing graph after route discovery initiated by a new node 4, in which the global graph is at the NC in accordance with the present invention.
    • Figures 5B-5F are local graphs of nodes 0 through node 4, respectively.
    DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • As employed herein, the term "wireless" shall expressly include, but not be limited by, radio frequency (RF), light, visible light, infrared, IrDA, ultrasound, wireless area networks, IEEE 802.11 (e.g., 802.11 a; 802.11 b; 802.11 g), IEEE 802.15 (e.g., 802.15.1; 802.15.3, 802.15.4), other wireless communication standards (e.g., without limitation, ZigBee Alliance standard), DECT, PWT, pager, PCS, Wi-Fi, Bluetooth, and cellular.
  • As employed herein, the term "portable communicating device" shall expressly include, but not be limited to, any portable communicating device having a wireless communication port (e.g., a handheld device; a handheld personal computer (PC); a portable or laptop PC; a Personal Digital Assistant (PDA); a mobile or cellular telephone; a wireless Internet device; a protocol-enabled telephone; a portable wireless device).
  • As employed herein, the term "network coordinator" (NC) shall expressly include, but not be limited to, any communicating device, which operates as the central controller in an ad-hoc communication network.
  • As employed herein, the term "network device" (ND) shall expressly include, but not be limited to, any communicating device (e.g., a portable communicating device; a fixed communicating device, such as, for example, switches, motion sensors or temperature sensors as employed in a wirelessly enabled sensor network), which participates in an ad-hoc communication network, and which is not a central controller.
  • As employed herein, the term "node" includes NDs and NCs.
  • As employed herein, "centralized routing" is a routing system in which a central system is responsible for telling other nodes which routes to use.
  • As employed herein, a "graph" is a diagram or other representation consisting of a finite set of nodes and internode connections (i.e., edges), which can be used for representing network connections.
  • As employed herein, "localized routing" is a routing system in which each node decides on the basis of locally available information, which routes to use.
  • As employed herein, "loop free" is a routing algorithm property, which provides that a message routed in a network will either be delivered to its final destination or be discarded in a finite amount of time.
  • As employed herein, "connected network device" is a network device whose participation in an ad-hoc communication network was accepted by the network coordinator.
  • As employed herein, "network topology" is a definition of the logical arrangement and interconnection pattern of nodes in a communication network.
  • As employed herein, "routing" is the function of finding a suitable path for a message to take from one node to its final destination.
  • As employed herein, the term "mains-powered" refers to any ND, which has continuous power capabilities (e.g., powered from an AC outlet or AC receptacle or AC power source; AC/DC powered devices; rechargeable battery powered devices; other rechargeable devices), but excluding non-rechargeable battery powered devices.
  • The present invention is described in association with a wireless sensor network, although the invention is applicable to a wide range of ad-hoc networks.
  • The present WSN routing methodology (PSRg or "graph-based PSR", but not to be confused with "PSR") is based on graph theory. PSR is disclosed by U.S. Patent Application Publication No. 2004/0233855 , which is incorporated by reference herein. The wireless nodes may be semi-mobile and may employ, for example, an IEEE 802.15.4 compliant radio or transceiver. In PSRg, each node manages the routing information in the form of a graph. When it changes, the routing graph is updated to the network coordinator (NC) node in the network. This NC merges all the local graphs to form and manage a global routing graph. By applying suitable graph algorithms, this NC node computes and specifies globally optimized routes to be followed by the network device (ND) nodes. In turn, the NC follows globally optimized routes to communicate with the ND nodes. By applying a formal analytical approach, the ND nodes do not need to use or accumulate routing specification in the message they transmit to the NC. This removes any maximum hop limitation for these messages and gains performance improvements over PSR.
  • The disclosed routing methodology combines the simplicity of PSR with the power of graph representation and analysis. This provides the following improvements: (1) given a set of nodes in the network and the associated link cost, cost is minimized along the route that node i selects to send a packet to another node j; (2) routing overhead is reduced; (3) the full potential of connectivity that exists in a network for routing robustness is exploited; and (4) the NC routing data is stored and processed more efficiently. These are accomplished by employing an efficient representation and analysis of the wireless link connectivity and routing information of nodes in a given mesh network. Graph data structures are employed by PSRg, while each ND node builds and maintains a graph to manage the routing locally, the NC node does the same to manage the routing globally. Each local graph is a smaller subset of the global graph.
  • The WSN routing information in the NC is represented as a graph G(V,E,C). The graph contains a set of vertices, V; a set of edges, E, connecting these vertices; and a set of link costs, C. All of the routing graphs are a function of time since vertices and edges are added and removed in real-time, reflecting the dynamics of the underlying WSN. For simplicity of disclosure, time is not mentioned in the notations of the graphs employed.
  • Each vertex v ∈ V represents a node in the network. The assigned vertex numbers are unique for each node in the network and correspond to its address. The vertex v is also referred to as a member node in the network. In the WSN architecture, only one of these nodes is the NC. The vertex number for the NC is 0. Every other vertex v represents one of the NDs.
  • In the disclosed PSRg, when a new node joins the network, the NC allocates a new vertex v such that V = V 4 {v}, where, in this example, v is assigned the next available positive integer that has not been assigned to any existing v' ∈ V.
  • Each edge e ∈ E is defined as an ordered pair of vertices. Formally, eij = (i, j) where ij ∈ V and i ! j. In other words, node i has a wireless link with node j and can send a message to it. Node j is called a neighbor of node i. This link is a directed one from node i to node j.
  • C ∈
    Figure imgb0001
    + is a set of link costs associated with the edges. A mapping c : E → C computes the link cost c(eij) associated with edge eij. So, each edge e ∈ E is assigned a link cost c(e) ∈ C, where C is a multiset and, hence, can have duplicate elements since two edges can have the same link cost.
  • Link cost is a quality measure of the reliability of the wireless communication link between two nodes. See, e.g., Hershberger, J., et al., "Vickrey prices and shortest paths: What is an edge worth?," Foundations of Computer Science, 2001, Proceedings. 42nd IEEE Symposium on, October 2001, pp. 252-59. This is a dynamic measure that depends on several factors such as, for example, wireless radio energy in the environment, and level of radio activity in the receiving node. Metal or concrete barriers can also significantly reduce the link quality. Computation of a suitable link cost is known. See, e.g., Draves, R., et al., "Comparison of routing metrics for static multi-hop wireless networks," Tech. Rep. MSR-TR-2004-18, Microsoft Research, 1999 (describing and comparing cost estimation techniques that indicate the wireless link quality in ad hoc networks).
  • The link cost is generally asymmetrical in nature. In other words, the link cost and, hence, the reliability of communication link when sending a message from a node i to another node j is not always the same as sending a message from node j to node i. As one example, for an ND trying to send a message to its neighbor NC, the chances that the message will arrive at the NC is lower than if the NC is to send a message to the ND. This is because the NC will handle more message traffic and, hence, be more prone to dropping or loosing packets. This is generally true between two neighboring nodes since there will be asymmetry of network traffic.
  • The NC does not compute the link costs. Each ND computes its link costs based on various relevant parameters available and sends those to the NC. Since, the NC does not have direct access to these parameters, it cannot compute the link costs.
  • The radio links between two nodes are not always perfectly symmetrical. However, arbitrarily considering all links (hence all graph edges) to be unidirectional is equivalent to ignoring existing redundant connectivity in a given network. This may result in suboptimal routing performance. On the other hand, by assuming unidirectionality of the edges, one can be less concerned about potential loops in the routing scheme. See, e.g., Mosko, M., et al., "Loop-free routing using a dense label set in wireless networks," Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS04), IEEE Computer Society, 2004; Prakash, R., "Unidirectional links prove costly in wireless ad-hoc networks," Seattle, August 1999, 3rd InternationalWorkshop on Discrete Algorithms and Methods for Mobile Computing and Communications; and Vanitchanant, N., et al., "Unidirectionality in ad-hoc networks: a simulation study," MILCOM: Military Communications Conference, October 2003, vol. 2, IEEE. As a result of this property, the NC routing graph G maintains directional edges eij and eji between two nodes i and j.
  • Figures 2A-2E show the routing graphs for a specific mesh network at a snapshot of time to. Each of the nodes 0,1,2,3, as shown with nodes 0 and 1, includes a processor 90, a memory 91 and a suitable communication interface 92. An edge connecting an upstream neighbor is drawn in solid line in the local graphs, while a downstream neighbor is connected as a dotted line edge. As discussed, node 0 is the NC and nodes 1, 2 and 3 are the NDs. Figure 2A shows an example NC routing graph G. The link costs are shown adjacent to each edge. For example, the link cost c(e21) associated with the edge from node 2 to node 1 is shown as cost c21.
  • The following example sends a message from a source node s χ V and a destination node d χ V in a given wireless sensor network represented by its global routing graph G(V,E,C). Since the route is between two different nodes, s ≠ d, the message from node s will take route, rsd to reach node d. Route rsd is described as an ordered set of all intermediate nodes that the message can possibly take. Formally, this is shown by Equation 1: r sd = r sd 1 , r sd 2 , , r sd n - 1 , r sd n = d
    Figure imgb0002

    wherein:
    • n is an integer.
    Route rsd also includes the destination node d as the last element in the ordered set. All intermediate nodes in a route specification are member nodes in the graph G, i.e., rsd_V. This is a subset since at least one member node, s, is not included in the route specification.
  • In a mesh network, the term "hop" is sometimes used to describe an intermediate node that a message is relayed through. The number of hops in a route r is, therefore, |r|. If rsd = {d}, then the message can be transmitted directly to the destination node d without using any intermediate node. Hereinbelow, for simplicity of disclosure when the context is clear, only route r is employed and the source and destination nodes for which they are specified are eliminated.
  • A route r ≠ ⇔ between a source node s and a destination node d is continuous if Equation 2 holds: r = { d : d = r 1 e sd E if r = 1 { r i } : e r i , r i + 1 E , 1 < i < r else .
    Figure imgb0003

    wherein:
    • i is an integer.
    The route is continuous if in graph G, there is an edge from the source node to the destination node. The route r is also continuous if starting at the source node and following directional edges to reach the destination node traverse each intermediate node successively.
  • Preferably, to avoid routing loops ("live lock") and to improve routing efficiency, loops are not employed in the route. In order to avoid loops, all valid routes satisfy the following property: a route r between a source node and a destination node is loop-free if each node in the route appears only once in the route. Formally, it is loop-free if αr(i), r(j) χ r : r(i) = r(j), ...1 < i, j ≤ |r|, wherein i and j are integers.
  • A route r is valid if it is continuous and loop-free. For example, in Figure 2A, a valid route between node i = 2 to j = 0, rij is {3, 1,0}.
  • The route cost of a valid route r is the sum of all the local link costs along the route. Formally, route cost is shown by Equation 3. C r = i = 1 r - 1 c e r i , r i + 1
    Figure imgb0004
  • The set Rsd is the set of all valid routes from a pair formed by a source node s to a destination node d. There exists a route from node s to node d if Rsd {⇔}. For example, in Figure 2A, R(2,0)= {{1,0}, {3,1,0}}. Given a valid route specified in Equation 1, the reverse of rsd is denoted by rsd as shown in Equation 4. r sd = r sd n - 1 , r sd n - 2 , , r sd 1 , s
    Figure imgb0005
    This is obtained by reversing the order of nodes in route rsd and replacing the destination node d in place of the source node s. In the previous example for r 2,0 = {3, 1, 0}, r 2,0 = {1, 3, 2}.
  • The property rsd χ Rsdr sd χ Rds states, in general, that a valid route from node s to node d, does not imply the validity of the corresponding reverse route from node d to node s. This follows directly from the link cost asymmetry property. If route rsd = ⇔, then there does not exist a route between the two given nodes.
  • The NC builds and maintains a graph G to manage the routing in the network. Each node in the network manages local routing information by maintaining a graph as well. A local graph for node i χ V is represented as Gi(Vi, Ei, Ci) where Vi _ V and Ei_E. The NC knows its own local graph G 0 in addition to the global graph G. Formally, Vi= {j : eij χ E} 4 {i} and Ei = {e ij χ E: ...j χ Vi }.
  • Similar to the NC global routing graph, each ND also maintains the local link costs in a multiset Ci. Unlike the NC, however, the ND i can compute link costs corresponding to its local routing graph edges. This is possible, since all the relevant parameters for computing this cost are only available to the local node. Consequently, a local link cost computing function is fLC i : V i - i δ + .
    Figure imgb0006
    Node i can compute the link cost to another node in its local routing graph by applying this function. Since, in this graph framework, there are no "self edges", the node does not need to compute the link cost to itself. This function may be suitably tuned for an individual ND. For example, the link cost function for a battery operated ND will be different from that of a "mains-powered" ND. Analogous to the global cost map c for a global routing graph, the local cost map ci is Ei δ Ci.
  • Figures 2B, 2C, 2D and 2E represent the local routing graphs for nodes 0, 1, 2 and 3, respectively.
  • The property ... i, αj χ Vi : (eji χ Ei) states that a local graph Gi for any node i shall have only outgoing edges from i. The set of nodes V us i _ V i
    Figure imgb0007
    is called the upstream nodes with respect to the node i if j 0 χ R u s i
    Figure imgb0008
    satisfy the following conditions: (1)j(Vi 4 {0}) - {i}; (2) |rχ R j0 . i∀r.j ≠ 0; and (3) i V u s j .
    Figure imgb0009
    The first condition provides that an upstream neighbor is a node in the local graph for i. Node 0 in this local graph is always an upstream node for i. Node i cannot be its own upstream neighbor. The second condition states that there exists a valid route from node j to the NC without going through node i. Finally, the last condition forbids node i from being an upstream neighbor in the local graph for j.
  • The property V u s 0 =
    Figure imgb0010
    states that the NC cannot have any upstream neighbor(s). This is true since the NC (node 0) is the first node to establish the network. In other words, no other member node can join this network before the NC does.
  • The subset V d s i
    Figure imgb0011
    is the set of downstream nodes. Formally, V d s i = V i -
    Figure imgb0012
    V u s i - i .
    Figure imgb0013
  • The property V i = i 4 V u s i 4 V d s i
    Figure imgb0014
    states that every node other than the node itself in a local graph is either an upstream or a downstream node. This follows directly from the definitions of upstream and downstream neighbors. In Figure 2D, local graph G 2 has node 1 as an upstream neighbor of node 2. Correspondingly, in local graph G 1, Figure 2C, node 2 is a downstream neighbor of node 1.
  • The property V u s i 3 V d s i =
    Figure imgb0015
    states that any neighbor node can be either an upstream or a downstream node, but not both.
  • A node i is called a leaf node, if V d s i = .
    Figure imgb0016
    In other words, a leaf node does not have any downstream neighbors. Membership in the graph framework is defined by a node i being a member of the network if i = 0 or i χ V and V u s i = .
    Figure imgb0017
    In other words, the NC is always a member of the network (since it starts the network formation). Any other node can only be a member of the network if it has at least one upstream neighbor. Membership reflects connectivity of the node in the network. In a mesh network, each new node should find a way to send messages to the NC. Upstream connectivity of a node gives it the ability to reach the NC eventually, either directly (with one hop) or indirectly (with multiple hops).
  • A node i is said to be isolated if iχ V and V u s i = .
    Figure imgb0018
    The difference between a member node and an isolated node is that in the latter case, the node is known to the network, but it does not have any upstream neighbor to communicate to the NC. If a node has only downstream neighbors, then it cannot be said that there is a valid route from that node to the NC.
  • Given all the neighbors of a node, the node will prefer to communicate first with the neighbor that has the minimum link cost. A locally minimum cost neighbor (LMCN) is the neighbor out of all the known neighbors of a node that has the minimum link cost. Of interest is either the upstream LMCN or downstream LMCN for a given node since the node will often need to send such directional messages. Two functions fLMCNus : V δ V and fLMCNds : V δ V give the LMCN for a given node i for upstream and downstream directions as shown by Equations 5 and 6, respectively: fLMCN us i = { Ø if V u s i = Ø , j : c i e i j c i e i k , k v u s i else .
    Figure imgb0019
    fLMCN ds i = { Ø if V d s i = Ø , j : c i e i j c i e i k , k v d s i else .
    Figure imgb0020
    The terms lmcn i us
    Figure imgb0021
    and lmcn i ds
    Figure imgb0022
    denote the output of fLMCNus(i) and fLMCNds(i), respectively.
  • For any two graphs Gi and Gj, two corresponding used operations are shown by Equations 7 and 8. The union operation is defined as follows: G i 4 G j = G k : V k = V i 4 V j , E k = E i 4 E j , C k = C i 4 C j
    Figure imgb0023
    Graph union combines the nodes and edges of two input graphs into one output graph. Similarly, the minus operator is defined as follows: G i - G j = G k : E k = E i - E j , C k = C i - C j
    Figure imgb0024
  • Two very important properties tie the local routing graphs to the global graph in the NC. These include strong and weak graph synchronization. For strong graph synchronization, the network is called strongly synchronized if Equation 9 is true: G = U i = 0 V G i
    Figure imgb0025
    Equation 9 provides that the network is perfectly synchronized if the routing graph at the NC is merely the union of all the local graphs at each member node. If this property holds true, then the NC has the knowledge of most current neighbor connectivity information of every member ND. A network should preferably strive to meet this state. However, trying to maintain strong synchronization under dynamic conditions when local connectivity information changes too fast or too often will result in poor routing performance.
  • For weak graph synchronization, the network is called weakly synchronized if Equation 10 is true: V = U i = 0 V V i E = U i = 0 V E i C U i = 0 V C i
    Figure imgb0026
    With weak synchronization, the global graph in the NC is equal to the union of all the local graphs at the ND (which is strong synchronization) except that the costs for some edges in the global graph are not equal to the costs for the counterpart edges in the local graph. In other words, the NC has the complete knowledge of the connectivity information of every member ND without perfect knowledge of link costs.
  • The network routing performance should improve by maintaining weak synchronization a majority of the time and choosing to attain strong synchronization only intermittently or infrequently. A network is not synchronized if it is neither strongly nor weakly synchronized. Any routing scheme should completely avoid or at least minimize the chances of the network attaining this form of synchronization. If this happens, message loss will increase in the system. Increasing routing delay is another potential observable consequence.
  • Equations 11-16, below, cover optimizing the routing in a given wireless sensor network. For a given pair of source and destination nodes, i, j, there exists a globally minimum cost route (GMCR). This GMCR is simply the route choice among all the possible routes available for the pair that has the minimum overall route cost. Note that the GMCR uses the minimum cost over the entire route, not just over one link. A function fGMCR : V × V δ +
    Figure imgb0027
    gives the GMCR for any given pair of source and destination node as shown in Equation 11: fGMCR i j = { Ø if R ij = Ø , r ij R ij | r r j ʹ R ij C r ij C r r j ʹ else .
    Figure imgb0028
  • For any route rij, GMCR is r i j gmc ,
    Figure imgb0029
    the return value of fGMCR(i,j). Due to the link cost asymmetry property, in general, r i j gmc r j i gmc ,
    Figure imgb0030
  • For any given pair of source and destination nodes i, j, the very first element in r i j gmc
    Figure imgb0031
    is called the global minimum cost neighbor (GMCN). Accordingly, a function fGMCN : V x V δ V returns this neighbor gmcnij as shown in Equation 12: fGMCN i j = { Ø if R i j gmc = Ø , r i j gmc 1 else .
    Figure imgb0032
  • There are three properties for any non-empty GMCR (i.e., fGMCR(i,j) ≠⇔). First, fGMCR i j = fGMCR i k 4 fGMCR i k i , j χ V , k χ r ij gmc .
    Figure imgb0033
    In other words, a GMCR consists of many sub-GMCRs. Any sub-route of a GMCR is also a GMCR.
  • The other two properties are important in defining an efficient upstream routing procedure. The second property, fGMCN(fGMCN(fGMCN(i, j), j), j) ... j ... i, j χ V, i ≠ j, states that a destination node can be traced by successively finding global minimum cost neighbors. This can be derived using the first property. The third property, fGMCR(i, j) = {fGMCN(i, j), fGMCN(fGMCN(i, j), j), ... , j}...i,j χ V, i≠j, states that the complete global minimum cost route can be traced using successive global minimum cost neighbors terminating at the destination node j. This can be derived using the first two properties.
  • Two messaging scenarios are important in the disclosed PSRg architecture. The first one is when different NDs have to send upstream messages to a single destination which is the NC in the network. The second one is when the NC has to send a message to each ND. In this case, all downstream messages have a single source (the NC) but different intended destinations (NDs). In order to handle these two scenarios, additional functions are shown in Equations 13-16. Equation 13 is called single source minimum cost route function fSSMCR. For any source node i, fSSMCR computes the GMCR from each node i to j≠i. fSSMCR i = r ij gmc : j V , j i
    Figure imgb0034
    fSSMCR(i) then returns a set of routes represented as SSMCRi.
  • For this given source node i, a function_fSSMCN(i) collects the GMCNs corresponding to each GMCR computed by fSSMCR(i). The function of Equation 14 returns a set SSMCNi containing all the single source minimum cost neighbors for source node i. fSSMCN i = gmcn i j : j V , j i
    Figure imgb0035
  • A single destination minimum cost route function fSDMCR is shown in Equation 15. For any destination node i,fSDMCR computes the GMCR from each node j ≠ i to i. fSDMCR i = r ji gmc : j V , j i
    Figure imgb0036
  • Analogously, for this given destination node i, a function fSDMCN(i) of Equation 16 collects the GMCNs corresponding to each GMCR computed by fSDMCR(i). The function returns a set SDMCNi containing all the single destination minimum cost neighbors for destination node i. fSDMCN i = gmcn j i : j V , j i
    Figure imgb0037
  • The disclosed PSRg architecture has four main functions: (1) route discovery; (2) upstream routing; (3) downstream routing; and (4) route recovery. Route recovery is the process of recovering from any error condition that may happen during the routing of a packet. This can happen during either downstream or upstream routing. For example, if an intermediate node is non-operational, then the packet cannot be routed further after being sent to this node. Hence, the error is detected and a remedial action is taken by the sending node.
  • For route discovery, the approach is to proactively determine the routes unlike on-demand routing schemes. A set of procedures describe the computational steps that each participant node performs. To explain the set of procedures that describe the route discovery protocol, a network state at time t 0 is depicted in Figures 2A-2E. In this state, the network has already formed with the NC (node 0) and three other member NDs ( nodes 1, 2 and 3). Figure 2A shows the current state of the global routing graph, G, and Figures 2B through 2E show the local routing graphs G0 through G3 for nodes 0 through 3, respectively.
  • Initially, for example, a new node is powered up inside the radio range of the nodes of the existing network. The new node goes through route discovery steps with participation from other member nodes. An example set of message interchanges and the sequence of these messages are shown in Figure 3. There, the member nodes are marked with their respective short address, equivalently the corresponding vertex number in the local and global graph representations. The new node is marked as x, since it only obtains its short address during the route discovery phase from the NC as was described above. Address allocation is obtained during the very first time a new node performs route discovery. If the new node is reset and restarted again to join the same network as before, then it retains the short address previously allocated.
  • In the following nine procedures of Figures 4A-4I, wireless messages (e.g., Beacon Request; Beacon Response; Beacon Confirm; Neighbor Update; Route Update) are shown in Figure 3 and the data carried in the messages are represented as parameters to the messages. The symbol "ε" is employed before a message name which represents that the node running the procedure is the sender of the message. Similarly, the symbol "χ" is employed to represent that the node is the receiver of the message. To distinguish between unicast and broadcast, all broadcast messages are represented as
    Figure imgb0038
    (node is the sender) or as f (node is the receiver). A superscript with these arrows is the address of the immediate neighbor to which the message is being sent to (ε j ) or the message is being received from (χ j ).
  • Figure 4A shows the procedure RouteDiscoveryClient 100. A node (ND) executes the RouteDiscoveryClient procedure 100 when it is powered up or reset or when the node is isolated from the network. This procedure 100 is not used by the NC (i = 0) since the NC establishes the network that another node (ND) wants to join as a member thereof. This procedure 100 first calls procedure NeighborDiscovery 102 of Figure 4B to learn about its member neighbors. It then uses procedure UpdateRoute 104 of Figure 4D to update the NC of the network about its newly learned neighbors and, in turn, receives recommendations about which neighbor to use for sending upstream messages that will yield maximum routing efficiency or minimum routing cost.
  • Figure 4B shows the procedure NeighborDiscovery 102. In step 106 of the procedure NeighborDiscovery 102, the node i erases its existing local routing graph since, in this procedure, it will rebuild this graph from scratch. In step 108, the node broadcasts a Beacon_Request message 110. This message 110 is equivalent to a "hello" message from this node for other neighboring member nodes. In Figure 3, this message 110 is marked as 1. In this scenario, the nodes 1, 2 and 3 receive this message 110 since these nodes are the only ones, in this example, within the radio range of the new node x. This broadcast message 110 is shown as three different messages from node x to each of nodes 1, 2 and 3 all originating at the same time t 1 .
  • Nodes 1, 2 and 3 have already gone through the discovery process to become a member of the network hosted by the NC, node 0. Each such member node also executes the procedure NeighborDiscoveryCoordinate 112 of Figure 4C.
  • In this procedure 112 of Figure 4C, in step 114, only the member nodes execute this process. In steps 116 and 118, whenever the node receives a Beacon_Request message 110, it sends out a Beacon_Response message 122. This response message has to be broadcast, since the request message does not carry any information about the sender node identity. In step 118, this response message carries the link cost c ij 120 as computed by the node i to the node j from which it just received the request message.
  • In Figure 3, node x receives a set of such Beacon_Response broadcasts (message 2) 122 from its member neighbors at times t2, t3, and t4. Referring to the NeighborDiscovery procedure 102 of Figure 4B, in even steps 124 through 134, the new node x waits for a fixed duration for the Beacon_Response message 122 from a member node j. In step 126 of this procedure 102, the new node x receives the link cost c ji 127 sent by node j and computes its own link cost cij 137 to node j, using its link cost function fLCi. Upon receipt of each such message 122, the new node x adds (in step 128) the member node j as another upstream vertex in its local graph Gi. Also, in step 130, the new node x adds an edge from i (itself) to j. With this, this node i now knows that its member node j is an upstream neighbor and can be used to send a wireless message upstream (closer to the NC). In step 132, the new node x adds the newly computed link cost to C'. Lastly, in step 134, the new node x sends a Beacon_Confirm message 136 to node j indicating that it accepted and recorded node j as its downstream neighbor. These steps repeat for each such member node j that responded to the earlier Beacon_Request. Following this procedure, in Figure 3, the node x sends this message 136 to nodes 1, 2 and 3 at times t7, t6 and t5, respectively.
  • On the other side, the member neighbor is waiting to receive any Beacon_Confirm message 136 in step 138 of the NeighborDiscoveryCoordinate procedure 112 of Figure 4C. When it receives this message from the new node x (in step 140), it adds the node as its downstream neighbor (in step 142). It then adds an edge from itself to the new node (step 144) and the previously computed corresponding link cost (step 146) in its local graph.
  • Referring to Figures 5C-5E with reference to the local graph edges of Figures 2A-2E, the graphs 148,150,152 in Figure 5C, 5D and 5E have added the new node x (node 4) as a downstream neighbor and the corresponding edges. Node 4 has built its local graph G4 in Figure 5F with three upstream neighbor nodes (1, 2 and 3) with the corresponding edges as well.
  • Figure 4D shows procedure UpdateRoute 104. After the neighbor discovery is complete, the new node 4 executes the UpdateRoute procedure 104 of Figure 4D to update the NC with its new found neighbor connectivity data. The NC never executes this procedure 104 since it does not go through the neighbor discovery process. In step 154, the new node i γ 0, erases its any known gmcn from a previous route discovery attempt. It then, in step 156, selects its upstream LMCN, node j from the just built local graph Gi. In step 158, it sends a Neighbor_Update message 160 to node j (message 160 at time t8 in Figure 3, j = 2). This message 160 carries the local graph Gi as data. The node i then waits in step 162 for a pre-specified time to receive a Route_Update message 164 to be initiated by the NC.
  • If the local neighbor which receives the Neighbor_Update message 160 is not the NC (which is the case in Figure 3), that node uses its upstream routing procedure (as is discussed below in connection with Figures 4F and 4G) to send the packet to the NC. This may take more than one hop as shown in Figure 3 where the message 160 is first sent to node 2 at t8 , then to node 1 at t9 and finally to the NC at t10.
  • Figure 4E shows the RouteDiscoveryService procedure 166. The message is processed in Figure 4E when the NC receives it. Only the NC in the network provides this service. When a node establishes itself in the role of the NC in the network, it initializes this procedure 166 in even steps 168 through 174 and then waits in an infinite loop starting at 176 for Neighbor_Update messages, such as 161. In step 170 of initialization, it starts with an empty global routing graph G and then adds only one vertex 0 to the graph. This vertex represents the NC itself since it has already become a de facto member. In step 172, the NC initializes a set of current GMCRs with it being the source. This SSMCR set is employed for sending messages downstream. In step 174, the NC maintains two sets of SDMCN for destination as 0 (i. e. , the NC itself as destination, relevant for upstream routing). SDMCN maintains the set of current GMCNs and SSMCN to maintain a set of previous GMCNs.
  • When it receives a Neighbor_Update message 161 originated at a client node i, the NC first removes all the existing edges to and from node i in graph G. This is accomplished in step 178 using the graph minus operator of Equation 8. If the client node i is attempting to join the network for the first time, then there will be no existing edges and, hence, no connectivity information for the node in G. In step 180, using the graph union operation of Equation 7, the newly arrived edges or connectivity information is added to graph G. Hence, essentially, in these two steps, the past connectivity information is replaced with the new one received from the client node.
  • In step 182, the existing SDMCN node information is saved for use later in step 190 of the procedure 166. In step 184, SDMCN is recomputed as per Equation 16 with the NC as the destination. In step 186, the downstream GMCR information is updated using Equation 13. In even steps 188 through 196, the NC determines the nodes for which gmcn for upstream routing to destination 0 has changed from the previous updates. The NC then sends a Route_Update message 164 (Figure 3) to each such node with the respective new gmcn (in step 192). Even though the NC receives a Neighbor_Update message 161 from a single route discovery client node, multiple nodes may receive a Route_Update message 164 from the NC as a result of the new connectivity information from the client node. The NC has to send a Route_Update message 164 to the route discovery client node since it is waiting for this in step 198 of UpdateRoute procedure 104 (Figure 4D). The NC employs the just computed SSMCR to specify the route for sending the Route_Update downstream message 164 to the discovery client node. It follows the procedure 200 of Figure 4H for this purpose. As an example, in Figure 3, although message 160 followed node 2 to node 1 to the NC on its route from node 4, message 165 at time t12 follows node 1 to node 4 directly. With the help of the new connectivity information from node 4, the NC found the latter route to be the globally minimum cost route for downstream routing to node 4.
  • The route discovery client node is waiting for a Route_Update message 165 in step 162 of the UpdateRoute procedure 104 (Figure 4D). When it arrives, in step 198, the node updates its gmcn address. The node employs this address as the preferred neighbor for all upstream messages meant for the NC. In step 202, the NC ascertains that this gmcn is indeed one of its known neighbors with which it has established a radio link.
  • With this, the node 4 is ready for regular upstream and downstream function that will be discussed next.
  • In PSR parlance, a message follows upstream routing if the NC is the final destination. PSRg adopts a very simple and efficient upstream routing mechanism. Once each node joins the network after the routing discovery process, it knows its gmcn for sending messages to the NC. A node always forwards the message to its gmcn. As soon as the next node receives the message and recognizes that it is an upstream message, it, in turn, forwards the same to its gmcn. There is no other route information that goes with the message. As per the second property, as was discussed above, following the GMCN successively, the message can arrive at the destination 0. The third property, discussed above, asserts that this route is indeed the globally minimum cost route and, hence, the most efficient route available. In this approach, the upstream message can be delivered to the NC irrespective of the number of hops it has to go through. Each additional hop adds extra latency to the message delivery.
  • Figure 4F shows procedure XmitUpstream 204. This procedure 204 outlines the algorithmic step that any node follows to transmit a message upstream. The NC never uses this procedure 204 since it is the final destination of all such messages. The same procedure 204 is used for sending upstream messages from a source node as well as relaying of upstream messages from intermediate nodes. The only step 206 in the procedure 204 sends the upstream message Msgus with the given payload pl to its gmcn. Each upstream message carries the source node s that originated this message. The NC needs to know this address so that it can send a confirmation message to source node s upon receipt of Msgus. Each upstream message carries a unique message identifier mid which is used by the source nodes to associate a confirmation from the NC to a specific message.
  • Figure 4G shows procedure ProcessUpstreamMsg 208. A node i uses this procedure 208 when it receives an upstream message sent by another node using the procedure 204 of Figure 4F. The NC has to process upstream messages differently since it is the final destination or the sink of all such messages. The NC uses step 210 of this procedure, first to send a confirmation to the source node s. This confirmation message is a downstream message and is sent using the procedure 200 of Figure 4H, as will be discussed. Then, in step 212, it suitably processes the upstream message. This ends the life of this upstream message. On the contrary, an intermediate node uses step 214 of the procedure 208 to simply forward the message to its gmcn using the procedure 204 of Figure 4F.
  • In upstream routing, the final destination (the NC) is always known to the nodes. Accordingly, the NC can provide them with the corresponding gmcn to which they will forward the message. In the case of downstream routing, the final destination will not be a fixed node. It can be any node other than the NC. Theoretically, it is possible for the NC to update a node with the set of gmcn for each possible destination (i.e., all other nodes). With this information, the node will look at the destination of the message and will find the corresponding gmcn, very much like the upstream routing. The downstream message will not carry along any routing specification. Hence, there will be no limit on how many hops the message routes through. A node will process the message if it is the final destination. However, this approach requires a lot of routing update overhead and is not preferred for a large scale network. Hence, a slightly modified approach can also be considered to alleviate this routing update overhead problem. In a typical wireless sensor network application, there is only selective communication among the nodes. It is rare that all nodes need to communicate with all other nodes. Hence, instead of the NC updating the gmcn value for all other nodes in the network, it can update the nodes with the gmcn values for a particular downstream destination on demand. In other words, the NC establishes a route to a downstream destination when it needs to send a message for the first time. Once the route is established, each intermediate node remembers the corresponding gmcn for the destination for future use. Consequently, the downstream routing is similar to the upstream routing, yet with less routing overhead.
  • The above approach can further be improved by observing the implications of the three properties. In order to compute SSMCR 0 in the procedure 166 of Figure 4E, the shortest path tree (SPT) is computed for graph G for source 0. Each branch of this tree is a GMCR. The downstream route re corresponding to each such branch can be uniquely specified by the end node eχ V in the branch. The route re is established on-demand. However, the NC does not need to send updates for a set of gmcn to each node iχ re for all other nodes in re which are downstream to i. It needs to send an update for only one gmcn to each i χ re.
  • A downstream message needs to carry end node e and the final destination of the message. When a node receives this message, and if it is not the intended destination, then it will forward the message to the gmcn that it has received previously associating the route re . With this on-demand and sparse update approach, the route update overheads are kept to a minimum. At the same time, downstream message routing is simple as that for an upstream message. Such an approach does not carry any routing specification and does not impose any ceiling on the number of message hops.
  • When a branch of the SPT splits into sub-branches, the node at which it sub-branches receives and manages multiple gmcn for each downstream subbranch. In the example approach, there is no further routing update overhead, and the complete route specification is carried with each downstream message. Since the source of all such messages is the NC, it can attach an accurate and optimized routing specification to the message. At this time, the network is no less than weakly synchronized.
  • Figure 4H shows the procedure XmitDownstream 200. Like its upstream transmit counterpart of Figure 4F, the procedure 200 of Figure 4H is used to initiate a message, albeit a downstream message. However, unlike the procedure 204 of Figure 4F, only the NC uses the procedure 200 of Figure 4H since it initiates all downstream messages. There are two major differences between these two procedures 204,200. First, in the only step 216 of the procedure 200 of Figure 4H, the entire routing specification r 0 d gmc
    Figure imgb0039
    is attached as part of the Msgds and this route is the GMCR for the given source and destination. Routing specification r 0 d gmc
    Figure imgb0040
    is readily available from step 184 of the procedure 166 of Figure 4E which computes and saves all such GMCRs to each possible destination. The NC forwards the message to the corresponding gmcn0d = SSMCR 0(1). Secondly, Msgds does not have to carry the source address 0 as every destination node knows this a priori. The destination node needs to know this address since it sends a confirmation back to the source node upon receiving the message.
  • Figure 4I shows the procedure ProcessDownstreamMsg 218. This procedure 218 is invoked when a downstream message Msgds is received at the current node i from a node j. Only a node i γ 0 can receive this message. In step 220 of this procedure 218, the current node did not receive this message incorrectly or accidentally violating routing specification carried in the message. If the current node is the intended final destination, then, in step 222, it sends a receipt confirmation to the NC using the upstream procedure 204 of Figure 4F. In step 224, the message is suitably processed to end its life.
  • If the current node is just an intermediate hopping node, in step 226, it removes its address from the route specification and then ascertains that the new route specification is not empty. In step 228, it simply forwards the message to the first node in the revised route specification.
  • Each graph is implemented as an adjacency list since these graphs are very sparse in a real wireless sensor network application. A key consideration is the computation of SSMCR0 and SDMCN0 in steps 186 and 184, respectively, of the procedure 166 of Figure 4E. SSMCR0 is computed by applying Dijkstra's single source shortest path algorithm on G from source 0. The algorithm computes first the shortest path tree (SPT). SSMCR0 can then be easily computed from the SPT. The implementation preferably employs a conventional minimum priority queue data structure. The algorithm complexity for this approach to computation is O(E log(V)).
  • SDMCN0 is computed from Equation 16. To compute this, first compute SDMCR0 from Equation 15. The Dijkstra algorithm computes the SPT for a single source to all other destination. In order to apply, the Dijkstra algorithm computes the SPT for a single destination, after first taking the transpose of graph G to compute GT. The transpose operation just changes the direction of all the edges in the original graph G. Then, the Dijkstra algorithm is applied on GT to compute a new SPT taking node O as the source (not destination) node. SDMCR0 can then be easily computed from this SPT. GT can be computed in O(E) time. Hence, the overall time to compute SDMCR0, and thus SDMCN0 is still O(E log(V)).
  • Another important aspect is short address allocation. In wireless sensor networks, every node is assigned a globally unique fixed address which is 8 bytes in length. It is expensive to use this long address with each message. Instead, the network preferably issues and manages a short address to each member node that is locally unique. In other words, the address is unique only within the given network. The short address is typically limited to 2 bytes in length. The implementation preferably serially allocates the vertex numbers for each new node. This same number is used as the short address for the node. Hence, the short address allocation and maintenance is simplified by following the graph based approach. If a node leaves the network permanently, then its short address will be available to be assigned to the next new node.
  • The disclosed PSRg approach optimizes the storage of routing data at the NC, while simultaneously extracting more implicit information about routing and network topology from it.
  • While specific embodiments of the invention have been described in detail, it will be appreciated by those skilled in the art that various modifications and alternatives to those details could be developed in light of the overall teachings of the disclosure. Accordingly, the particular arrangements disclosed are meant to be illustrative only and not limiting as to the scope of the invention which is to be given the full breadth of the claims appended and any and all equivalents thereof.
  • REFERENCE NUMERICAL LIST
  • 90
    processor
    91
    memory
    92
    communication interface
    100
    procedure
    102
    procedure NeighborDiscovery
    104
    procedure UpdateRoute
    106
    step
    108
    step
    110
    Beacon_Request message
    112
    procedure NeighborDiscoveryCoordinate
    114
    step
    116
    step
    118
    step
    120
    link cost cij
    122
    Beacon_Response message
    124
    step
    126
    step
    127
    link cost cji
    128
    step
    130
    step
    132
    step
    134
    step
    136
    Beacon_Confirm message
    137
    link cost cij
    138
    step
    140
    step
    142
    step
    144
    step
    146
    step
    148
    graph
    150
    graph
    152
    graph
    154
    step
    156
    step
    158
    step
    160
    Neighbor_Update message
    161
    Neighbor_Update message
    162
    step
    164
    Route_Update message
    165
    message
    166
    RouteDiscoveryService procedure
    168
    step
    170
    step
    172
    step
    174
    step
    176
    infinite loop
    178
    step
    180
    step
    182
    step
    184
    step
    186
    step
    188
    step
    190
    step
    192
    step
    194
    step
    196
    step
    198
    step
    200
    procedure
    202
    step
    204
    procedure XmitUpstream
    206
    step
    208
    procedure ProcessUpstreamMsg
    210
    step
    212
    step
    214
    step
    216
    step
    218
    step
    220
    step
    222
    step
    224
    step
    226
    step
    228
    step

Claims (26)

  1. An ad-hoc network comprising:
    an ad-hoc network coordinator comprising:
    a first processor,
    a first memory, and
    a first communication interface; and
    a plurality of ad-hoc network devices, each of said ad-hoc network devices comprising:
    a second processor,
    a second memory, and
    a second communication interface structured to communicate with the first communication interface of said ad-hoc network coordinator or with the second communication interface of at least another one of said ad-hoc network devices,
    wherein said first processor cooperates with at least some of said ad-hoc network devices to globally optimize a route based on a plurality of link costs for: (i) pairs of said ad-hoc network devices, or (ii) pairs of said ad-hoc network devices and at least one pair including one of said ad-hoc network devices and said ad-hoc network coordinator, in order to minimize cost along said route that: (a) one of said ad-hoc network devices or said ad-hoc network coordinator employs to send a packet to: (b) another one of said ad-hoc network devices or said ad-hoc network coordinator.
  2. The ad-hoc network of Claim 1 wherein said route includes at least one of said ad-hoc network devices other than said one of said ad-hoc network devices and said other one of said ad-hoc network devices.
  3. The ad-hoc network of Claim 1 wherein said ad-hoc network devices are structured to build and maintain a plurality of local graphs to manage packet routing locally for the corresponding one of said ad-hoc network devices; and wherein said ad-hoc network coordinator is structured to build and maintain a global graph to manage packet routing globally for said ad-hoc network.
  4. The ad-hoc network of Claim 3 wherein each of said local graphs is a smaller subset of said global graph.
  5. The ad-hoc network of Claim 3 wherein said local graphs comprise a set of vertices corresponding to some of said ad-hoc network devices, a set of edges connecting said vertices, and a set of link costs associated with said edges.
  6. The ad-hoc network of Claim 1 wherein said ad-hoc network is a wireless sensor network.
  7. The ad-hoc network of Claim 1 wherein said ad-hoc network is a low rate wireless personal area network.
  8. A method for determining routing of packets of an ad-hoc network comprising an ad-hoc network coordinator and a plurality of ad-hoc network devices, said ad-hoc network devices communicating with said ad-hoc network coordinator or with at least another one of said ad-hoc network devices, said method comprising:
    employing a plurality of link costs for: (i) pairs of said ad-hoc network devices, or (ii) pairs of said ad-hoc network devices and at least one pair including one of said ad-hoc network devices and said ad-hoc network coordinator;
    globally optimizing a route based on said link costs; and
    minimizing cost along said route that: (a) one of said ad-hoc network devices or said ad-hoc network coordinator employs to send a packet to: (b) another one of said ad-hoc network devices or said ad-hoc network coordinator.
  9. The method of Claim 8 further comprising
    employing said one of said ad-hoc network devices as a source node;
    employing said other one of said ad-hoc network devices as a destination node;
    employing as said route a global minimum cost route, which includes at least one of said ad-hoc network devices other than said one of said ad-hoc network devices and said other one of said ad-hoc network devices; and
    employing as a first element of said global minimum cost route a first global minimum cost neighbor of said source node.
  10. The method of Claim 9 further comprising
    employing a single source minimum cost route function for said source node;
    determining a plurality of global minimum cost routes from said source node to each of the other ones of said ad-hoc network devices;
    employing said global minimum cost routes as a set of routes;
    determining a plurality of global minimum cost neighbors corresponding to said global minimum cost routes; and
    determining for each of said global minimum cost routes a set including at least one minimum cost neighbor for said source node.
  11. The method of Claim 9 further comprising
    employing as a second element of said global minimum cost route a second global minimum cost neighbor of said first global minimum cost neighbor; and
    employing at least one successive global minimum cost neighbor terminating at said destination node.
  12. The method of Claim 8 further comprising
    for at least one of said ad-hoc network devices:
    discovering a route when powered up, reset or when isolated from said ad-hoc network;
    learning about some of said ad-hoc network devices as being neighbor ad-hoc network devices;
    informing said ad-hoc network coordinator about said neighbor ad-hoc network devices; and
    receiving from said ad-hoc network coordinator a recommendation about which one of said neighbor ad-hoc network devices to use for sending upstream packets toward said ad-hoc network coordinator, in order to maximize routing efficiency or minimize routing cost.
  13. The method of Claim 8 further comprising
    for each of said ad-hoc network devices, building and maintaining a plurality of local graphs to manage routing locally for the corresponding one of said ad-hoc network devices; and
    for said ad-hoc network coordinator, building and maintaining a global graph to manage routing globally for said ad-hoc network.
  14. The method of Claim 13 further comprising
    for one of said ad-hoc network devices, discovering some of said ad-hoc network devices as being neighbor ad-hoc network devices;
    discarding the corresponding one of said local graphs;
    broadcasting a request message to at least one of said neighbor ad-hoc network devices;
    responsively receiving a response message from at least one of said neighbor ad-hoc network devices; and
    updating the corresponding one of said local graphs with two vertices, an edge and a link cost associated with said response message from a corresponding one of said at least one of said neighbor ad-hoc network devices to said one of said ad-hoc network devices.
  15. The method of Claim 14 further comprising
    for the corresponding one of said at least one of said neighbor ad-hoc network devices, receiving said request message;
    employing said link cost as a first link cost;
    determining a second link cost from said one of said ad-hoc network devices to said corresponding one of said at least one of said neighbor ad-hoc network devices; and
    broadcasting said response message including the second link cost.
  16. The method of Claim 15 further comprising
    for said one of said ad-hoc network devices, receiving said response message including the second link cost;
    determining the first link cost from said corresponding one of said at least one of said neighbor ad-hoc network devices to said one of said ad-hoc network devices;
    adding said corresponding one of said at least one of said neighbor ad-hoc network devices as an upstream vertex in the corresponding one of said local graphs; and
    adding an edge from said corresponding one of said at least one of said neighbor ad-hoc network devices to said one of said ad-hoc network devices.
  17. The method of Claim 16 further comprising
    sending a confirm message to said corresponding one of said at least one of said neighbor ad-hoc network devices indicating acceptance as a downstream neighbor; and
    receiving another response message from another one of said at least one of said neighbor ad-hoc network devices.
  18. The method of Claim 12 further comprising
    for said one of said ad-hoc network devices, completing said discovering a route for said neighbor ad-hoc network devices;
    informing said ad-hoc network coordinator of said neighbor ad-hoc network devices;
    discarding any prior global minimum cost neighbor;
    selecting the upstream local minimum cost neighbor from the corresponding one of said local graphs;
    sending a first update message to said upstream local minimum cost neighbor including said corresponding one of said local graphs; and
    receiving a second update message from said ad-hoc network coordinator.
  19. The method of Claim 18 further comprising
    receiving said first update message at said upstream local minimum cost neighbor;
    for said upstream local minimum cost neighbor, selecting a corresponding upstream local minimum cost neighbor from the corresponding one of said local graphs;
    forwarding said first update message to the last said corresponding upstream local minimum cost neighbor including the corresponding one of said local graphs of said one of said ad-hoc network devices; and
    forwarding said first update message to said ad-hoc network coordinator.
  20. The method of Claim 8 further comprising
    employing upstream routing if the ad-hoc network coordinator is the final destination of a packet sent by one of said ad-hoc network devices; and
    employing a global minimum cost neighbor defined by said ad-hoc network coordinator as an initial destination of said packet sent by one of said ad-hoc network devices.
  21. The method of Claim 20 further comprising
    for another one of said ad-hoc network devices, joining said ad-hoc network;
    receiving a global minimum cost neighbor for said other one of said ad-hoc network devices as defined by said ad-hoc network coordinator;
    employing upstream routing if the ad-hoc network coordinator is the final destination of another packet sent by said other one of said ad-hoc network devices; and
    employing the last said global minimum cost neighbor as an initial destination of said other packet sent by said other one of said ad-hoc network devices.
  22. The method of Claim 8 further comprising
    employing downstream routing when said ad-hoc network coordinator sends a packet to one of said ad-hoc network devices.
  23. The method of Claim 22 further comprising
    for said ad-hoc network coordinator, updating one of said ad-hoc network devices with a set of global minimum cost neighbors for each possible destination of packets to each of the other ones of said ad-hoc network devices.
  24. The method of Claim 23 further comprising
    receiving said packet to one of said ad-hoc network devices at another one of said ad-hoc network devices;
    for said other one of said ad-hoc network devices, determining the corresponding global minimum cost neighbor; and
    forwarding said received packet to said determined corresponding global minimum cost neighbor.
  25. The method of Claim 24 further comprising
    including the address of said determined corresponding global minimum cost neighbor in said forwarded packet; and
    employing no routing specification in said forwarded packet.
  26. The method of Claim 22 further comprising
    for said ad-hoc network coordinator, updating on demand selected ones of said ad-hoc network devices with corresponding global minimum cost neighbors for a particular downstream destination on demand;
    establishing a route to a downstream destination after one of said ad-hoc network devices needs to initially send a packet to said particular downstream destination; and
    after said establishing a route, each intermediate one of said ad-hoc network devices maintaining a corresponding global minimum cost neighbor for said particular downstream destination.
EP07002140A 2006-02-02 2007-01-31 Ad-hoc network and method employing globally optimized routes for packets Withdrawn EP1816805A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/347,077 US7633882B2 (en) 2006-02-02 2006-02-02 Ad-hoc network and method employing globally optimized routes for packets

Publications (1)

Publication Number Publication Date
EP1816805A1 true EP1816805A1 (en) 2007-08-08

Family

ID=37914682

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07002140A Withdrawn EP1816805A1 (en) 2006-02-02 2007-01-31 Ad-hoc network and method employing globally optimized routes for packets

Country Status (6)

Country Link
US (1) US7633882B2 (en)
EP (1) EP1816805A1 (en)
AU (1) AU2007200482B2 (en)
BR (1) BRPI0704256A (en)
CA (1) CA2576361A1 (en)
MX (1) MX2007001385A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2273732A1 (en) * 2008-04-25 2011-01-12 Fujitsu Limited Node device and program
EP2296407A1 (en) * 2009-09-10 2011-03-16 Fujitsu Limited Wireless communication network and adaptive routing communication method thereof
WO2020111989A1 (en) * 2018-11-27 2020-06-04 Telefonaktiebolaget Lm Ericsson (Publ) Automatic and dynamic adaptation of grouping in a data processing system

Families Citing this family (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101337126B1 (en) * 2005-05-12 2013-12-05 삼성전자주식회사 Method and apparatus for achieving re-association of handover in a wireless local area network mesh network
KR100825735B1 (en) * 2006-09-29 2008-04-29 한국전자통신연구원 Method for Address Space Management about nodes incapable of communication over ZigBee Network
US8638806B2 (en) * 2007-05-25 2014-01-28 Hand Held Products, Inc. Wireless mesh point portable data terminal
KR101378257B1 (en) * 2007-06-15 2014-03-25 삼성전자주식회사 Method for construction virtual backbone in wireless sensor networks
CN101355490B (en) * 2007-07-25 2012-05-23 华为技术有限公司 Method, system and node equipment for routing information
CN101594579A (en) * 2008-05-28 2009-12-02 上海亿动信息技术有限公司 Information release control system for actively releasing information in wireless communication mode
US9253707B2 (en) * 2008-06-04 2016-02-02 Koninklijke Philips N.V. Network interface unit for a node in a wireless multi-hop network, and a method of establishing a network path between nodes in a wireless multi-hop network
US9807849B2 (en) * 2008-09-10 2017-10-31 Enlighted, Inc. Automatically commissioning lighting controls using sensing parameters of the lighting controls
US8538584B2 (en) * 2008-12-30 2013-09-17 Synapsense Corporation Apparatus and method for controlling environmental conditions in a data center using wireless mesh networks
US8600560B2 (en) 2008-12-30 2013-12-03 Synapsense Corporation Apparatus and method for controlling computer room air conditioning units (CRACs) in data centers
US20110299425A1 (en) * 2009-02-12 2011-12-08 Praveen Kumar Addressing and Routing Scheme for Distributed Systems
EP2237504B1 (en) * 2009-03-30 2013-07-17 The Boeing Company Mobile AD HOC network
ES2473515T3 (en) 2009-03-30 2014-07-07 The Boeing Company Mobile ad hoc network
US8694578B2 (en) * 2009-05-29 2014-04-08 Microsoft Corporation Swarm-based synchronization over a network of object stores
US10205319B2 (en) * 2010-06-11 2019-02-12 Eaton Intelligent Power Limited Automatic matching of sources to loads
US8760995B1 (en) 2010-07-08 2014-06-24 Amdocs Software Systems Limited System, method, and computer program for routing data in a wireless sensor network
US8849926B2 (en) * 2010-08-06 2014-09-30 Simon Fraser University System and method for self-calibrating, self-organizing and localizing sensors in wireless sensor networks
FR2964287B1 (en) * 2010-08-30 2012-09-21 Cybronics Sasu TARGETED DATA DELIVERY SYSTEM
US8811377B1 (en) 2010-08-30 2014-08-19 Synapsense Corporation Apparatus and method for instrumenting devices to measure power usage using a multi-tier wireless network
US8804489B2 (en) * 2010-09-29 2014-08-12 Telefonaktiebolaget L M Ericsson (Publ) Fast flooding based fast convergence to recover from network failures
JP5683715B2 (en) * 2010-11-16 2015-03-11 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for wireless direct link operation
US9166908B2 (en) * 2011-12-20 2015-10-20 Cisco Technology, Inc. Assisted intelligent routing for minimalistic connected object networks
US9100285B1 (en) 2012-12-18 2015-08-04 Juniper Networks, Inc. Dynamic control channel establishment for software-defined networks having centralized control
US9979595B2 (en) 2012-12-18 2018-05-22 Juniper Networks, Inc. Subscriber management and network service integration for software-defined networks having centralized control
US10749711B2 (en) 2013-07-10 2020-08-18 Nicira, Inc. Network-link method useful for a last-mile connectivity in an edge-gateway multipath system
US10454714B2 (en) 2013-07-10 2019-10-22 Nicira, Inc. Method and system of overlay flow control
US10057123B1 (en) 2013-12-27 2018-08-21 Alarm.Com Incorporated Network topology backup
US9380513B2 (en) * 2014-05-16 2016-06-28 Qualcomm Incorporated Reducing broadcast duplication in hybrid wireless mesh protocol routing
US9392525B2 (en) 2014-05-16 2016-07-12 Qualcomm Incorporated Establishing reliable routes without expensive mesh peering
US9565623B2 (en) * 2014-08-12 2017-02-07 Digi International Inc. Systems and methods for ordering candidates for wireless network association
US9634928B2 (en) * 2014-09-29 2017-04-25 Juniper Networks, Inc. Mesh network of simple nodes with centralized control
US10425382B2 (en) 2015-04-13 2019-09-24 Nicira, Inc. Method and system of a cloud-based multipath routing protocol
US10498652B2 (en) 2015-04-13 2019-12-03 Nicira, Inc. Method and system of application-aware routing with crowdsourcing
US10135789B2 (en) 2015-04-13 2018-11-20 Nicira, Inc. Method and system of establishing a virtual private network in a cloud service for branch networking
CN105357731A (en) * 2015-10-14 2016-02-24 国网辽宁省电力有限公司营口供电公司 Energy-efficient wireless sensor network (WSN) routing protocol design method for use in electromagnetic interference environment
US11121962B2 (en) 2017-01-31 2021-09-14 Vmware, Inc. High performance software-defined core network
US11706127B2 (en) 2017-01-31 2023-07-18 Vmware, Inc. High performance software-defined core network
US10992568B2 (en) 2017-01-31 2021-04-27 Vmware, Inc. High performance software-defined core network
US11252079B2 (en) 2017-01-31 2022-02-15 Vmware, Inc. High performance software-defined core network
US10992558B1 (en) 2017-11-06 2021-04-27 Vmware, Inc. Method and apparatus for distributed data network traffic optimization
US20180219765A1 (en) 2017-01-31 2018-08-02 Waltz Networks Method and Apparatus for Network Traffic Control Optimization
US20200036624A1 (en) 2017-01-31 2020-01-30 The Mode Group High performance software-defined core network
US10778528B2 (en) 2017-02-11 2020-09-15 Nicira, Inc. Method and system of connecting to a multipath hub in a cluster
US10574528B2 (en) 2017-02-11 2020-02-25 Nicira, Inc. Network multi-source inbound quality of service methods and systems
US10523539B2 (en) 2017-06-22 2019-12-31 Nicira, Inc. Method and system of resiliency in cloud-delivered SD-WAN
US10999100B2 (en) 2017-10-02 2021-05-04 Vmware, Inc. Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider
US10959098B2 (en) 2017-10-02 2021-03-23 Vmware, Inc. Dynamically specifying multiple public cloud edge nodes to connect to an external multi-computer node
US10999165B2 (en) 2017-10-02 2021-05-04 Vmware, Inc. Three tiers of SaaS providers for deploying compute and network infrastructure in the public cloud
US11115480B2 (en) 2017-10-02 2021-09-07 Vmware, Inc. Layer four optimization for a virtual network defined over public cloud
US10778466B2 (en) 2017-10-02 2020-09-15 Vmware, Inc. Processing data messages of a virtual network that are sent to and received from external service machines
US11089111B2 (en) 2017-10-02 2021-08-10 Vmware, Inc. Layer four optimization for a virtual network defined over public cloud
US11223514B2 (en) 2017-11-09 2022-01-11 Nicira, Inc. Method and system of a dynamic high-availability mode based on current wide area network connectivity
US10771182B2 (en) * 2018-04-25 2020-09-08 Cisco Technology, Inc. Enhancing routing metrics
US11153202B2 (en) 2019-05-13 2021-10-19 128 Technology, Inc. Service and topology exchange protocol
US11451464B2 (en) 2019-05-13 2022-09-20 128 Technology, Inc. Central authority for service and topology exchange
US11070465B2 (en) 2019-05-13 2021-07-20 128 Technology, Inc. Distribution of multicast information in a routing system
US11329912B2 (en) * 2019-05-13 2022-05-10 128 Technology, Inc. Source-based routing
US10999182B2 (en) 2019-05-13 2021-05-04 128 Technology, Inc. Routing using segment-based metrics
US11005749B2 (en) 2019-05-13 2021-05-11 128 Technology, Inc. Multicast source and receiver access control
US11121985B2 (en) 2019-08-27 2021-09-14 Vmware, Inc. Defining different public cloud virtual networks for different entities based on different sets of measurements
US11611507B2 (en) 2019-10-28 2023-03-21 Vmware, Inc. Managing forwarding elements at edge nodes connected to a virtual network
CN110831006B (en) * 2019-11-29 2023-04-07 北京紫光展锐通信技术有限公司 Ad hoc network system and data transmission method thereof
US11489783B2 (en) 2019-12-12 2022-11-01 Vmware, Inc. Performing deep packet inspection in a software defined wide area network
US11394640B2 (en) 2019-12-12 2022-07-19 Vmware, Inc. Collecting and analyzing data regarding flows associated with DPI parameters
US11438789B2 (en) 2020-01-24 2022-09-06 Vmware, Inc. Computing and using different path quality metrics for different service classes
WO2021263047A1 (en) 2020-06-24 2021-12-30 Juniper Networks, Inc. Layer-2 network extension over layer-3 network using encapsulation
US11245641B2 (en) 2020-07-02 2022-02-08 Vmware, Inc. Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN
US11709710B2 (en) 2020-07-30 2023-07-25 Vmware, Inc. Memory allocator for I/O operations
US11575591B2 (en) 2020-11-17 2023-02-07 Vmware, Inc. Autonomous distributed forwarding plane traceability based anomaly detection in application traffic for hyper-scale SD-WAN
US11575600B2 (en) 2020-11-24 2023-02-07 Vmware, Inc. Tunnel-less SD-WAN
US11929903B2 (en) 2020-12-29 2024-03-12 VMware LLC Emulating packet flows to assess network links for SD-WAN
CN116783874A (en) 2021-01-18 2023-09-19 Vm维尔股份有限公司 Network aware load balancing
US11979325B2 (en) 2021-01-28 2024-05-07 VMware LLC Dynamic SD-WAN hub cluster scaling with machine learning
US12009987B2 (en) 2021-05-03 2024-06-11 VMware LLC Methods to support dynamic transit paths through hub clustering across branches in SD-WAN
US11509571B1 (en) 2021-05-03 2022-11-22 Vmware, Inc. Cost-based routing mesh for facilitating routing through an SD-WAN
US11729065B2 (en) 2021-05-06 2023-08-15 Vmware, Inc. Methods for application defined virtual network service among multiple transport in SD-WAN
US12015536B2 (en) 2021-06-18 2024-06-18 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds
US11489720B1 (en) 2021-06-18 2022-11-01 Vmware, Inc. Method and apparatus to evaluate resource elements and public clouds for deploying tenant deployable elements based on harvested performance metrics
US12047282B2 (en) 2021-07-22 2024-07-23 VMware LLC Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN
US11375005B1 (en) 2021-07-24 2022-06-28 Vmware, Inc. High availability solutions for a secure access service edge application
US11943146B2 (en) 2021-10-01 2024-03-26 VMware LLC Traffic prioritization in SD-WAN
US11909815B2 (en) 2022-06-06 2024-02-20 VMware LLC Routing based on geolocation costs
US12034587B1 (en) 2023-03-27 2024-07-09 VMware LLC Identifying and remediating anomalies in a self-healing network
US12057993B1 (en) 2023-03-27 2024-08-06 VMware LLC Identifying and remediating anomalies in a self-healing network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040008663A1 (en) * 2000-12-29 2004-01-15 Devabhaktuni Srikrishna Selection of routing paths based upon path quality of a wireless mesh network
EP1453245A1 (en) * 2003-02-28 2004-09-01 Siemens Aktiengesellschaft Routing method for ad-hoc networks
EP1480387A1 (en) * 2003-05-19 2004-11-24 Eaton Corporation Source routing protocol for an ad-hoc communication network
US20050157661A1 (en) * 2004-01-20 2005-07-21 Lg Electronics Inc. Mobile ad hoc network system and operating method thereof

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6714559B1 (en) * 1991-12-04 2004-03-30 Broadcom Corporation Redundant radio frequency network having a roaming terminal communication protocol
US5412654A (en) * 1994-01-10 1995-05-02 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
US6728214B1 (en) * 1999-07-28 2004-04-27 Lucent Technologies Inc. Testing of network routers under given routing protocols
US20020061001A1 (en) * 2000-08-25 2002-05-23 The Regents Of The University Of California Dynamic source tracing (DST) routing protocol for wireless networks
KR100514681B1 (en) * 2000-09-22 2005-09-13 주식회사 케이티 Method for providing an optimal route in an asynchronous transfer mode and apparatus therefor
CN1471785A (en) * 2000-10-26 2004-01-28 ���˹���Ѷ��� Telecommunications routing
US7420952B2 (en) * 2002-10-28 2008-09-02 Mesh Dynamics, Inc. High performance wireless networks using distributed control
US6850492B2 (en) * 2002-11-22 2005-02-01 Nokia Corporation Method and system for enabling a route and flow table update in a distributed routing platform
US7577108B2 (en) * 2003-06-03 2009-08-18 Palo Alto Research Center Incorporated Learning-based strategies for message-initiated constraint-based routing
US7881229B2 (en) * 2003-08-08 2011-02-01 Raytheon Bbn Technologies Corp. Systems and methods for forming an adjacency graph for exchanging network routing data
US7480248B2 (en) * 2003-08-22 2009-01-20 Samsung Electronics Co., Ltd. Apparatus and method for determining aggregated link costs in a mobile ad hoc network
US7414977B2 (en) * 2003-11-25 2008-08-19 Mitsubishi Electric Research Laboratories, Inc. Power and delay sensitive ad-hoc communication networks
US7532623B2 (en) * 2004-03-24 2009-05-12 Bbn Technologies Corp. Methods for wireless mesh multicasting
US20050257269A1 (en) * 2004-05-03 2005-11-17 Chari Suresh N Cost effective incident response
US7769848B2 (en) * 2004-09-22 2010-08-03 International Business Machines Corporation Method and systems for copying data components between nodes of a wireless sensor network
US8027289B2 (en) * 2005-04-27 2011-09-27 Raytheon Bbn Technologies Corp. Ultra-low latency packet transport in ad hoc networks
US20070147255A1 (en) * 2005-12-23 2007-06-28 Ozgur Oyman Routing in wireless mesh networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040008663A1 (en) * 2000-12-29 2004-01-15 Devabhaktuni Srikrishna Selection of routing paths based upon path quality of a wireless mesh network
EP1453245A1 (en) * 2003-02-28 2004-09-01 Siemens Aktiengesellschaft Routing method for ad-hoc networks
EP1480387A1 (en) * 2003-05-19 2004-11-24 Eaton Corporation Source routing protocol for an ad-hoc communication network
US20050157661A1 (en) * 2004-01-20 2005-07-21 Lg Electronics Inc. Mobile ad hoc network system and operating method thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2273732A1 (en) * 2008-04-25 2011-01-12 Fujitsu Limited Node device and program
EP2273732A4 (en) * 2008-04-25 2013-01-23 Fujitsu Ltd Node device and program
US8817616B2 (en) 2008-04-25 2014-08-26 Fujitsu Limited Node device and computer readable storage medium storing program
EP2296407A1 (en) * 2009-09-10 2011-03-16 Fujitsu Limited Wireless communication network and adaptive routing communication method thereof
WO2020111989A1 (en) * 2018-11-27 2020-06-04 Telefonaktiebolaget Lm Ericsson (Publ) Automatic and dynamic adaptation of grouping in a data processing system
US11539584B2 (en) 2018-11-27 2022-12-27 Telefonaktiebolaget Lm Ericsson (Publ) Automatic and dynamic adaptation of grouping in a data processing system

Also Published As

Publication number Publication date
CA2576361A1 (en) 2007-08-02
BRPI0704256A (en) 2008-02-26
AU2007200482B2 (en) 2010-11-18
AU2007200482A1 (en) 2007-08-16
US20070177511A1 (en) 2007-08-02
MX2007001385A (en) 2008-11-18
US7633882B2 (en) 2009-12-15

Similar Documents

Publication Publication Date Title
US7633882B2 (en) Ad-hoc network and method employing globally optimized routes for packets
Gelenbe et al. Power-aware ad hoc cognitive packet networks
US20090161578A1 (en) Data routing method and device thereof
US20070064950A1 (en) Wireless communication system, wireless communication device, method of wireless communication, and computer program
US7843833B2 (en) Detection and handling of lost messages during load-balancing routing protocols
Devi et al. Mobile ad hoc networks and routing protocols in iot enabled
Thepvilojanapong et al. Har: Hierarchy-based anycast routing protocol for wireless sensor networks
Zhang et al. Smart routing with learning-based qos-aware meta-strategies
Dixit Comparative Study of Location-Based Routing Protocols For MANETs
Sreenivasu et al. Analysis of SEA-based MANET routing protocol for Improved Firefly Energy Optimized Routing
Rahman et al. 4-N intelligent MANET routing algorithm
KR100686973B1 (en) Cross-layer protocol design method for energy-efficient routing in power-controlled multihop wireless networks
Ingelrest et al. Routing and broadcasting in hybrid ad hoc networks
Jayalakshmi et al. Link stable routing with minimal delay nodes for MANETs
Liang Multipoint Relay and Connected Dominating Set Based Broadcast Algorithms for Wireless Ad Hoc Networks
Yang et al. A new on-demand routing algorithm based on nodes' locations for MANET
Renjith et al. Analysis on Ad hoc Routing Protocols in Wireless Sensor Networks
Kumari AGDT: A Mathematical Model of Hybrid Algorithm for Efficient Routing in MANETs Using Dynamic Thresholds
Dhanush et al. Delay and hop sensitive routing protocol for vehicular ad hoc networks
Panda A clustering approach in mobile ad-hoc networks routing
CN110831105A (en) Method for selecting nodes with fewer neighbors in Ad Hoc route to reduce communication interference
Lee et al. MP-AODV: A new multipath routing protocol based on AODV in mobile ad hoc networks
Ramesh et al. A study of routing techniques in intermittently connected manets
Rengarajan et al. An Efficient Lightweight Proactive Source Routing Protocol for Handling Overhead, Packet Delivery, Throughput in MANETS
Miao et al. Multi-path routing based on link lifetime in mobile Ad Hoc networks

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

17P Request for examination filed

Effective date: 20070823

17Q First examination report despatched

Effective date: 20070920

AKX Designation fees paid

Designated state(s): BE DK GB LU NL

REG Reference to a national code

Ref country code: DE

Ref legal event code: 8566

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130801